Keeping the Stars Aligned

Consider these best practices to stay on track

Multi-tenant buildings present security challenges not found in single-user facilities. Tenants may come and go at different times. The numbers and types of visitors needing access will vary. Then there are differences between commercial and residential multitenant buildings.

An experienced commercial integrator said one of his biggest challenges dealing with a multi-tenant security project is balancing the needs and desires of tenants that often don’t align.

“Professional service tenants who receive many clients and visitors daily prefer a more open, welcoming and accessible environment,” said Dario Santana, president of San Diego-based Layer 3 Security Services. “Tenants who rarely receive visitors tend to be comfortable with more restrictive security in place.”

This forces building management to make tradeoffs. While no approach will completely satisfy every tenant, Santana said the right mix of systems and policies will provide a high level of security to please the majority.

Getting Inside

Determining who—and how—tenants and visitors get into the building is another major challenge. Santana said the solution lies with the best security practices he uses in virtually any commercial facility. He recommends keeping main entries locked whenever possible and then using a combination of an access control system and a video intercom to let people in.

Tenants use key fobs or individual codes at access readers or keypads mounted outside the main entry to easily access the building. Visitors locate a tenant name on the display or posted directory and enter the corresponding number into the intercom keypad to call a station in the tenant’s suite. The system lets the tenant see visitors and have a two-way conversation with them. Once the tenant identifies them and feels confident to permit them in the building, the tenant can buzz in the visitor by pushing a button.

Santana said buildings that need to be open during business hours can use these systems when doors are locked at night, during weekends and on holidays.

Matthew Arnold, president of Hicksville, New York-based Academy Mailbox, said he’s used the same access control/video intercom arrangement in the many security projects his company has completed for Metropolitan New York multi-family residential buildings.

“The gateway product is the video intercom,” he said. “It lets tenants make informed decisions about who they let into the building and act as a deterrent to criminals. The unit’s built-in cameras also can record images which may be useful for later identifying people who came to the door.”

Arnold said many buildings now create entry vestibules inside the main public entry. This can help control the problem of tailgating. A second video intercom inside the locked vestibule gives tenants another chance to see who’s entering. It’s a minor inconvenience, but greatly improves security.

Arnold is also an advocate of access control systems with key fobs as a quick and convenient way to get tenants into the building. And if fobs are lost, they can be quickly disabled by the integrator or an on-site manager and a new fob created at minimal cost.

“Electronic locks and fobs are much more secure than any key and provide greater convenience for little added expense,” he said.

Be Wise on Choices

Ideally, doors should be made of solid-core wood. There’s no need for expensive anti-ballistic metal portals. But from a security point of view, neither integrator favored glass doors. Safety film and screens make glass more difficult to break, but wood doors are most secure.

High-quality locks are also important. Arnold said he usually chooses electric strike locks with a “fail-safe, fail-secure” standard, meaning they remain locked on the outside during a power failure. Surveillance cameras are another important security layer in all multi-tenant facilities. Combined with the cameras in the video intercoms, they provide additional evidence of who’s entered the building.

Santana also likes intrusion detection systems as another layer shared by all commercial building tenants. He installs the burglar alarm system with separate partitions.

“The building’s common areas could be partition A, suite 1 would be partition B, suite 2 would be C and so on,” he said. “Everyone in the building would have the authority to arm/disarm common areas and their own suites.”

Santana said tenants and building managers gain from the integration of the various security layers. For example, an intrusion system alarm should signal the nearest surveillance camera to begin recording. Both key fobs and video intercoms integrate with door locks to allow entry for tenants and visitors. Manufacturers using open standards for their products make this possible. Open standards let integrators select equipment based on price, performance and quality by not limiting end users to proprietary product lines. This helps protect the total investment by allowing components to be replaced without ripping out an entire system.

Both Santana and Arnold said tenant training is important for the smooth operation of building security. The systems are easy to use and just take a few minutes of training.

Make Fewer Errors

Errors are most likely to occur when a tenant allows an unknown person to enter the facility. One common routine among burglars is to push multiple apartment extensions on the video intercom keypad, noting who fails to respond, but wired intercom solutions can provide additional security. Calls from entries to tenant stations can only be answered from within the residence, ensuring all visitors have been properly screened.

Santana said a property manager’s message should be clear; if you let someone into the building, that person becomes your responsibility. Also, each building needs to maintain a list of approved security products to avoid problems as tenants may want to add their own potentially incompatible security devices to protect individual suites.

Before beginning any new or retrofit job, Arnold completes a risk assessment of the current security equipment. While creating a project plan, he asks himself how he would want to be protected if he lived in the building.

As the industry continues to create new and refine older solutions, the choices for securing a multi-tenant building will increase. What may have seemed impossible only a year or two ago, is now possible thanks to the power of network-based systems, integration and open standards.

This article originally appeared in the November 2017 issue of Security Today.

Featured

  • New Report Reveals Top Trends Transforming Access Controller Technology

    Mercury Security, a provider in access control hardware and open platform solutions, has published its Trends in Access Controllers Report, based on a survey of over 450 security professionals across North America and Europe. The findings highlight the controller’s vital role in a physical access control system (PACS), where the device not only enforces access policies but also connects with readers to verify user credentials—ranging from ID badges to biometrics and mobile identities. With 72% of respondents identifying the controller as a critical or important factor in PACS design, the report underscores how the choice of controller platform has become a strategic decision for today’s security leaders. Read Now

  • Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

    An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. Read Now

  • ASIS International Introduces New ANSI-Approved Investigations Standard

    • Guard Services
  • Cloud Security Alliance Brings AI-Assisted Auditing to Cloud Computing

    The Cloud Security Alliance (CSA), the world’s leading organization dedicated to defining standards, certifications, and best practices to help ensure a secure cloud computing environment, today introduced an innovative addition to its suite of Security, Trust, Assurance and Risk (STAR) Registry assessments with the launch of Valid-AI-ted, an AI-powered, automated validation system. The new tool provides an automated quality check of assurance information of STAR Level 1 self-assessments using state-of-the-art LLM technology. Read Now

  • Report: Nearly 1 in 5 Healthcare Leaders Say Cyberattacks Have Impacted Patient Care

    Omega Systems, a provider of managed IT and security services, today released new research that reveals the growing impact of cybersecurity challenges on leading healthcare organizations and patient safety. According to the 2025 Healthcare IT Landscape Report, 19% of healthcare leaders say a cyberattack has already disrupted patient care, and more than half (52%) believe a fatal cyber-related incident is inevitable within the next five years. Read Now

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area.