Violent incidents, some involving “active shooters,” have occurred in schools, shopping malls, colleges, and courthouses. No commercial facility is immune from this type of crime. Access control systems have become an increasingly popular way to enable the lockdown of a facility in the case of an emergency. When implemented properly, the access control software can centrally manage user authorization and monitor all doors.
There are two basic types of electronic access control systems – offline and networked. Offline systems are not connected by the network and include mechanical key programs, meaning that while the locks cannot communicate with each other, they do provide the ability for authentication.
Conversely, networked electronic access control systems are connected to a network either wirelessly or by being hardwired to the system. This provides the potential for faster lockdown, as it can be a very integrated system that incorporates access control, video cameras, digital video recording, alarm monitoring and badging. Facilities can also set timers to restrict access outside of regular business hours, limiting traffic and unwanted visitors.
Although it’s not a solution in every case, the ability to secure a building’s perimeter or an individual department through a lockdown process, even for a few minutes, may reduce the potential for injury or death. With this in mind, here are eight proven and reliable best practices for perimeter security and access management that can help create a safer working environment for your clients.
1. Establish a single point of entry. Creating one primary location for individuals to enter the building creates a far more secure environment. This is preferably a front door location that is easily seen and supervised to provide more control over who should – and shouldn’t – enter the building. The main entrance should be clearly marked by signage with directions to a visitor management center.
2. Create a vestibule to manage visitor entry. A vestibule at the main entrance provides an additional layer of perimeter security. The design automatically funnels visitors into a main office to be screened before granting them access to other parts of the building.
3. Install visitor management software. A visitor management software system employed at the vestibule entrance offers a number of access management benefits, including allowing control to secured areas, knowing who is in the building and the reason for their visit, and screening against unwanted guests.
4. Access Management. Implementing an electronic access control system significantly reduces the risk of unauthorized access because individuals must provide authentication with a credential such as a magnetic swipe card, proximity card and even PIN. These credentials can be used in combination to create an even greater level of access control. Unlike traditional keys, access rights for these credentials can be easily revoked, rendering the card or code useless. This translates into cost savings for the facility by eliminating the need to re-key locks and issue new keys every time one is lost, stolen or damaged. Smart credentials are an affordable and effective means of improving physical and logical access control while providing the convenience of one credential for a multitude of tasks.
5. Leverage an interoperable communications platform. A successful perimeter security and access management plan requires the collaboration and participation of all involved parties – including first responders. At the first sign of an emergency, occupants need to ensure that police, fire and rescue personnel can quickly be alerted of the problem and provide help. Putting into place an interoperable communications platform allows security to alert first responders of an incident using two-way radios, and provide first responders immediate access to the building.
6. Install a panic alarm system. Panic buttons add an extra layer of security to a comprehensive perimeter security and access management plan. They can be placed at strategic points, such as just inside the entry vestibule. When integrated to local first responders, a pressed panic button automatically alerts law enforcement and other predetermined security personnel, allowing for quick response.
7. Ensure that all other points of entry are secure at all times. Unsecured doors have the potential to allow unauthorized access. Often times, an entry point becomes compromised when a building occupant props it open. There are a number of security devices available to ensure that that all points of entry are secure at all times. Sensors can alert staff via an audible alarm when a door is not secure and door status switches notify monitoring systems of any issues.
8. Train and drill all staff on policies, procedures and technologies. In order for security solutions to perform at their best, staff must be fully trained on policies, procedures and technologies. A single point of contact for fielding questions after staff training strengthens your efforts and the likelihood of success.
Minu Youngkin is Marketing Manager for Allegion. To find out more about the types of security solutions available, visit Allegion.com.