Ask The Expert

This month's expert discusses the tricky business of securing high-rise buildings

THE tall, graceful skyscrapers that form the dramatic skylines of our major cities create special security challenges not found in other construction. Multiple floors with multiple tenants can lead to access control nightmares and extra fire hazards -- witness the deadly 1980 blaze at the MGM Grand Hotel in Las Vegas and a 2003 fire in Chicago's Cook County Administration Building. And as recent history has shown, high-rises can be targets for terrorists.

One building industry information provider estimates that there are now about 89,000 high-rise buildings in more than 8,000 cities worldwide. With potentially thousands of tenants and visitors entering a building each day, letting the good guys in and keeping the bad guys out is an enormous task that requires the assistance of electronic access control systems.

ISSUE: What types of access control products are effective?

SOLUTION: Optical turnstiles, which are capable of providing access to 45 to 60 people per minute per unit, are being used more frequently in high-rise office buildings. Turnstiles can work with a variety of access control technologies -- cards, biometrics or PINs -- to ensure that each person is authorized to enter. The units also can protect against piggybacking, a situation where a cardholder opens a door for an unauthorized person. Turnstiles also provide anti-passback capability, prohibiting users from leaving through an entry lane.

Visitor management systems enable building management to print a high-quality badge after electronically scanning a visitor's identification, such as a driver's license or business card. The information is then stored in the system's database for later retrieval.

Many buildings also rely on uniformed security guards in the lobby as an added safety measure.

Electronic access control also can be used to ensure elevators deliver employees and visitors only to those floors where they have business. Employees using an elevator can swipe their access cards through a magnetic card reader in the elevator car to gain access to their office floor. Temporary cards can be issued to visitors to limit their access within the building.

ISSUE: But what if unauthorized people get off the elevator when another person exits?

SOLUTION: Elevators can open into lobbies with locked doors that require another card swipe in order to enter the office areas. Or instead of locked lobbies, card readers can be placed directly outside a company's office door. Video surveillance cameras also can be used to provide information on who has gotten off an elevator on a specific floor.

In addition to elevators, stairwells also provide additional access to offices throughout buildings, as well as an emergency escape route in the event of a fire. For that reason, access to the stairs is often highly regulated by local building codes. In some cities, stairwell doors only open outward, meaning once inside the stairwell, a person cannot re-enter the building on another floor. In other major cities, these laws have changed because of incidents involving people trapped in stairwells during a fire.

Currently, some cities require that all stairwell doors automatically unlock during a fire or power outage. Other cities require that a central source, such as a fire dispatch center, be able to unlock the doors in an emergency. And others require two-way intercom communication from inside the stairwell that links to a command post that is manned 24 hours a day and has the capability to unlock the doors.

ISSUE: How can a building manager pick the best system?

SOLUTION: Building management should look for a security integrator familiar with local codes. Also, that integrator should have experience in dealing with the special security considerations of high-rise buildings. Ideally, that experience should include working with elevator companies, as this will be key in developing a strong security system.

The integrator selected also should be sensitive to a multi-tenant environment and understand the priorities and pressures on the property management firm. A good integrator will know how to balance the safety and security needs of the facility to ensure a highly secure and efficient environment.

As promised, we're delivering answers to the questions that you, are readers, want answered

ISSUE: I oversee security for a professional services firm. We have our headquarters in a downtown high-rise that includes an access control system. About two years ago, the firm leased a smaller office to be near a major client base. There was no access system, so one was installed to match what we have in our headquarters. The two systems communicate over the corporate network. Recently, we have added another outlying office that had an existing access system from a different manufacturer. Can we add this system to our network, or will we need to replace it with one to match our other systems?

SOLUTION:

Most access control systems operate in a similar way from a user standpoint using the Windows® operating platform that features drop-down menus, cardholder picture input and interfacing with select DVR units. They also tie into industry-standard locking hardware, card readers, door contacts, motion detectors and turnstiles, to name a few of the devices that are common to access control. In most cases, the cable requirements are the same from the panel to the field devices, and can be reused.

However, this is where the similarity ends. Each manufacturer has its own proprietary software and access control panel hardware that work together and form the core of a manufacturer's system. In your case, the control panel would need to be changed to match the system that is installed in your corporate facility and provide an IP address to plug the panel into.

After this is accomplished, the cables should be able to transfer directly to the new landing points on the panel and the system should work just as the other offsite location currently does.

 

What's on your mind

What's on your mind? Do you have a question or a topic that you'd like addressed in Ask The Expert? If so, please e-mail it to asktheexpert@stevenspublishing.com.

This article originally appeared in the February 2006 issue of Security Products, pg. 32.

Featured

  • The Next Generation

    Video security technology has reached an inflection point. With advancements in cloud infrastructure and internet bandwidth, hybrid cloud solutions can now deliver new capabilities and business opportunities for security professionals and their customers. Read Now

  • Help Your Customer Protect Themselves

    In the world of IT, insider threats are on a steep upward trajectory. The cost of these threats - including negligent and malicious employees that may steal authorized users’ credentials, rose from $8.3 million in 2018 to $16.2 million in 2023. Insider threats towards physical infrastructures often bleed into the realm of cybersecurity; for instance, consider an unauthorized user breaching a physical data center and plugging in a laptop to download and steal sensitive digital information. Read Now

  • Enhanced Situation Awareness

    Did someone break into the building? Maybe it is just an employee pulling an all-nighter. Or is it an actual perpetrator? Audio analytics, available in many AI-enabled cameras, can add context to what operators see on the screen, helping them validate assumptions. If a glass-break detection alert is received moments before seeing a person on camera, the added situational awareness makes the event more actionable. Read Now

  • Transformative Advances

    Over the past decade, machine learning has enabled transformative advances in physical security technology. We have seen some amazing progress in using machine learning algorithms to train computers to assess and improve computational processes. Although such tools are helpful for security and operations, machines are still far from being capable of thinking or acting like humans. They do, however, offer unique opportunities for teams to enhance security and productivity. Read Now

Featured Cybersecurity

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3