Access Control
Access control solutions manage traffic flow through entryways and access points in your facility. Their purpose is to restrict the access of employees and visitors to sensitive areas.
While security guards and other personnel can perform access control when needed, it is most cost-effective to use an electronic access control solution in most cases. Those solutions can include:
Electronic Access Control
These systems connect to a central database where employee access privileges are recorded. When employees authenticate themselves at an access point, the system verifies whether they are allowed through and opens the access point accordingly.
Employees authenticate themselves using a “token,” such as:
- Swipe cards - Identification data is stored on a magnetic strip, like on a credit card. The card is swiped at a reader to authenticate the holder.
- RFID fobs - Radio frequency identification tokens that communicate over short-range wireless. The fob is waved near a reader to authenticate.
- Prox cards - are flat cards pressed against readers to authenticate the holder. Newer prox cards use embedded RFID antennas to transmit credentials.
- Mobile phone apps - A secure app on a user’s phone identifies them when they approach access points. Phones authenticate the holder by transmitting their identity over Bluetooth or NFC—short-range wireless standards universally available on mobile devices.
- Biometrics - Personnel use a unique pattern on their body to verify identity. The two most common are fingerprint scans and iris eye scans. The blood vessel patterns in everyone's eyes are unique.
Electronic access controls are very secure, but they can be expensive. Most organizations only deploy electronic access control at their most sensitive access points.
Mechanical Access Control
Given the high cost of electronic access control, mechanical key and lock systems continue to secure most doors and other access points. Mechanical access control is very cost-effective for managing access points with routine levels of security. The major downside to using mechanical controls is that they lack built-in tracking and accountability like their electronic counterparts.
Key Management Systems
Combining mechanical access controls with an electronic key management system is one model that many organizations employ as a cost-effective alternative to electronic access control. At their core, key management systems are secure cabinets with electronic access control terminals attached.
Users authenticate themselves at the terminal and specify which keyring they want to sign out. The request is logged, and the system unlocks only the keyring selected.
Key management systems can also automate many useful but time-consuming administrative tasks. Managers can set curfews on key sign-outs or limit the number of keys a single employee can have in their possession at one time. If a return curfew is missed or keys are not returned at the end of a shift, the key management system can alert the employee’s supervisor.
Asset Management Systems
As with keys, many businesses find controlling access to sensitive or expensive equipment beneficial. Similarly to key management systems, asset management systems use a combination of secure cabinets, access control terminals, and smart sensor technology to control who, when, and how stored assets are used.
Asset surveillance sensors inside locker compartments can identify assets when signed out or returned for better accountability and inventory tracking. Curfews and alerts also help prevent unnecessary losses and ensure vital equipment is ready when employees need it.
Surveillance
Surveillance is the process of gathering information relevant to an organization’s physical security. That information commonly includes the locations of potential threats, the locations of personnel and valuable equipment moving through your facility, and the activities of security personnel.
Video Surveillance
Traditionally, video surveillance systems had to be actively monitored by security personnel to identify threats on screen. Either that or they were just used to passively collect footage for review if a security incident occurred.
More modern security systems use video analytics software capable of detecting potential threats on their own. This software can recognize cars entering a secured lot after hours or even the motion of an attacker swinging a punch. When a potential threat is recognized, the analytics automatically notify human security personnel so they can respond.
Alarms
Whereas video surveillance systems record what is happening inside a particular location, alarm systems monitor for attempts in access to unattended locations. Different kinds of sensors are employed for different alarm functions.
Motion sensors detect movement in low-light or dark environments. Perimeter sensors detect when a door or other access point is breached. Glass break sensors detect the unique frequency of glass breaking.
These are some of the most common sensor types. All of them notify security personnel to respond when a breach is detected.
Deterrence
The purpose of deterrents is to prevent threats from ever arising in the first place.
Lighting
Maintaining good visibility indoors and outdoors is an excellent way to deter potential threats. Lighting is particularly important around access points like doors and windows. It is also important in parking lots and other areas where people are likely to be alone.
Physical Barriers
Fences, vehicle gates, walls, and even shrubbery can deter criminals looking for an easy target. A barrier can deter many threats from trying to breach your perimeter if it requires extra effort to cross.
Environmental Design
This is most important for organizations with large, open campuses, like universities and medical centers. Open pathways, courtyards, and plazas increase visibility, leaving criminals with no hidden locations in which to operate. Consider reducing tall vegetation inside the perimeter of your campus to maintain sightlines in every possible direction.
Response
Lastly, physical security can use electronic solutions to aid response efforts after identifying a threat.
Personnel Tracking
This is most important in high-security environments, like corrections centers. Any facility at high risk of experiencing violence or of becoming the target of an attack must be able to identify the locations of security personnel for rapid response instantly. A guard tour system is one solution that monitors personnel movement in real time to ensure maximum readiness.
Evacuation Management
Fires, natural disasters, and other emergencies require an immediate response from all parts of your organization to ensure your personnel's and your business's safety. Managing evacuations is one of the most important parts of emergency management.
Automated emergency mustering and roll call systems verify whether personnel are safe at muster points or at risk inside your facility. This information helps emergency managers and first responders act more effectively during chaotic and dangerous circumstances.