Join the Team

Join the Team

Moving further into buildings and operations

Winning more business is typically thought of as using marketing, advertising, referrals, or even cold calls and precision pitching to secure new opportunities at new clients. When it comes to physical security integration, there are after all, only so many doors to secure in your area of operation.

But rather than spend that time and money to find new clients, what if you could win more business with your current clients who already know and trust you, and with whom you have a business partnership?

The key to this approach is in knowing your solutions for security better than anyone else, in finding manufacturers who offer a diverse range of products and solutions, and presenting these new security options to your client in a way that operationally improves their business.

In short, you’re looking for ways to move farther into a client’s building and further into their operations. This is accomplished by seeking out areas where access control and audit capabilities are critical. Look for locations currently under lock and key, but not digitized due to a previous constraint (location unavailable for cabling, afterthought areas, locations where access control typically isn’t implemented). Most importantly, ask your clients what they still need to protect—or are protecting in different ways—conduct a site survey or facility walkthrough to identify areas they might be missing or are unaware could be improve, and see if you can provide updated solutions.

This approach, of course, can also be used on new projects where perimeter doors are specified, be sure to offer additional services. If you can come in under budget with new solutions on an initial bid, that leaves new funds for additional installations. It also gives the integrator a bit of a “hero moment” with clients, which is critical for long-term success and relationship building.

Here are a few examples of applications that can allow you to win more business with existing clients.

CABINETS, STORAGE AND SMALLER OPENINGS

Cabinet locks with wireless capabilities are one of the quickest ways to seek out new openings to secure within a facility. In many businesses, there are file cabinets full of sensitive documents being stored behind poorly-manufactured locks that could be quickly and easily broken into.

An upgrade to more robust locks not only adds a physical security component but also a digital layer of security through the use of access control units, which restrict who can access the items through credentialing, and provides an audit trail so managers can review who accessed the location and when it was accessed.

These locks work on more than just cabinets. Storage of sensitive materials—such as medical supplies in hospitals, or computer components in IT environments—also requires a much higher level of security than standard mechanical locks can provide. An audit trail adds a level of accountability to storing and accessing these materials.

This application plays into healthcare spaces where medications are stored. From schools with onsite nurses to emergency rooms and hospital pharmacies, the ability to secure medical supplies in a single space or in individual patient rooms is a critical operational shift. It means the ability to treat patients more quickly and easily. Again, it comes with the ability to provide an audit trail so no medications are accessed without documentation.

Looking a bit more toward the enterprise side of things, employee storage units are now being utilized in co-working environments where an atypically scheduled workforce may exist. The new demand from businesses that utilize these workforces is to provide employee lockers or storage where the employee can choose a different locker every day with just their keycard. This is a fundamental shift in the security paradigm—moving away from predetermined access—but it is available for integration.

That same level of access control can now be used in more places than just traditional doors. In these co-working environments, the need to track who used what desk or work space could also be a priority, and using the same credential on the desk as the storage unit, with the same flexible technology, is valuable for a business.

SERVER SPACES

Also in the enterprise space is the need to secure server rooms and server racks. For racks, using the same type of cabinet locks, be they wireless or wired, provides a facility with solutions to a number of problems and vulnerabilities.

The locks restrict access to individual cabinets while also recording the audit trail of who accessed what and when. For locations that control their own data with onsite servers, this is a critical need as it allows for a robust level of in-house auditing. For colocation facilities, it may be even more critical as it allows the service provider to offer clients the assurance that only the correct people are accessing their servers.

Further, with server spaces, an additional level of security can be added in the event of a network failure. Intelligent keys, which also provide an audit trail, can be integrated alongside a standard lock. This means the access control device itself could be without power, but the key will still be able to open the rack in an emergency situation, and the accountability remains intact.

In all of these scenarios, the result is ensuring only authorized employees are accessing server racks for specific reasons. These capabilities help facilities meet PCI and FISMA requirements as well.

For the server room itself, integrators should ensure that all access points are utilizing a high level of security. Typically, a biometric of some type—iris, hand-geometry, fingerprint—has become the expectation in these build outs.

There are even technologies that allow for integration of biometrics on mobile devices. That means an individual can receive a credential on their handheld device and activate it with a fingerprint reader. It’s a more affordable solution that still allows for access to be granted to technicians and security in the event of an emergency without losing the high level of security needed for that location.

GOVERNMENT CONTRACTS

Government facilities are now subject to rules dictated by the Federal Government’s Identity, Credential, and Access Management (FICAM) program. FICAM sets the standards for implementation of secure access to all government facilities, and mandates the use of FIPS 201 Personal Identity Verification (PIV) for federal employees and contractors.

What this means is that every federal employee and contractor today is issued a PIV ID Card. All facilities need to work toward implementing PIV access control points. The job of integrators is to know these requirements exist, how they work, and be prepared to implement solutions at government facilities.

While this is good information for seeking out new business, being knowledgeable about the subject also helps integrators move deeper into a facility. Exterior doors, where strong authentication is required, utilize electro-mechanical locks, electric strikes and hardwired PIV-enabled card readers. Meanwhile, the interior of the building can support the same PIV credentials at a lower cost using PIVenabled WiFi, PoE and Integrated Wiegand solutions.

PARTNERSHIPS REMAIN KEY

Again, the best way to discover opportunities to further expand an integration is to be well versed on the technologies available and be partnered with manufacturers who are invested in your success.

It’s critical to approach every client with the intent of collaboration. Listen to their needs, address those concerns, then seek out additional openings. By using wireless deployments, you can often come in under budget for what an owner may expect. That extra expenditure can then be used to make the building more secure in other areas. Providing more security at an affordable rate is a prime way to develop profitable, long-term relationships.

Finally, communicate the needs you see in the field back to manufacturers. Ask them for the solutions that will help you in your sales and integrations. We operate in a world where nearly every opening can be secured?it is simply a matter of working together to develop the correct solution.

This article originally appeared in the April 2018 issue of Security Today.

Featured

  • Trends Keeping an Eye on Business Decisions

    Today, AI continues to transform the way data is used to make important business decisions. AI and the cloud together are redefining how video surveillance systems are being used to simulate human intelligence by combining data analysis, prediction, and process automation with minimal human intervention. Many organizations are upgrading their surveillance systems to reap the benefits of technologies like AI and cloud applications. Read Now

  • The Future is Happening Outside the Cloud

    For years, the cloud has captivated the physical security industry. And for good reason. Remote access, elastic scalability and simplified maintenance reshaped how we think about deploying and managing systems. But as the number of cameras grows and resolutions push from HD to 4K and beyond, the cloud’s limits are becoming unavoidable. Bandwidth bottlenecks. Latency lags. Rising storage costs. These are not abstract concerns. Read Now

  • The Impact of Convergence Between IT and Physical Security

    For years, the worlds of physical security and information technology (IT) remained separate. While they shared common goals and interests, they often worked in silos. Read Now

  • Unlocking Trustworthy AI: Building Transparency in Security Governance

    In situations where AI supports important security tasks like leading investigations and detecting threats and anomalies, transparency is essential. When an incident occurs, investigators must trace the logic behind each automated response to confirm its validity or spot errors. Demanding interpretable AI turns opaque “black boxes” into accountable partners that enhance, rather than compromise, organizational defense. Read Now

  • Seeking Innovative Solutions

    Denial, Anger, Bargaining, Depression and Acceptance. You may recognize these terms as the “5 Phases” of a grieving process, but they could easily describe the phases one goes through before adopting any new or emerging innovation or technology, especially in a highly risk-averse industry like security. However, the desire for convenience in all aspects of modern life is finally beginning to turn the tide from old school hardware as the go-to towards more user-friendly, yet still secure, door solutions. Read Now

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge.