You’re Not Alone

You’re Not Alone

Choosing the proper access control system has many considerations

Is facility security something that you’re worried about? If you answered yes, you aren’t alone. According to the 2022 Ontic Center for Protective Intelligence Report, 88% of security correspondents are experiencing a dramatic increase in physical threat activity that is anticipated to grow this year.

A staggering 66% reported receiving or investigating at least one physical threat per week. The top things that are keeping security leaders awake at night include physical threats related to social or political issues, active shooters and C-suite focusing more on supply chain and cyber security instead of location specific facilities. Facility security is more important now than it ever has been. To understand how to mitigate risk in 2022, we have to start at the beginning.

It All Starts with Access Control
Physical locks and keys can and should continue to be used, but the evolution of access control has provided enhanced technological innovation to facility security. Quality access control systems allow for employee access to be restricted or granted into individual facilities, campuses, buildings, and rooms. Door security, whether using doors, turnstiles, or, lift gates is controlled by the parameters set by your access control settings.

Selecting the right access control system for your organization is the foundation of a quality facility security plan. Choosing the right access control system for your organization has several main considerations. Will you use cloud or on premise hosting? Is there one door or hundreds of doors? Will you use prox cards and do you need mobile credentials?

Once you have the right access control system in place for your organization, the next step is staff tracking. When every employee is properly using their badges to get in and out as they enter and leave the building and campus, you have a powerful tool in your facility security toolkit. You will be able to properly account for all employees at all times.

You will have a historical audit trail of employees as they come and go complete with custom reporting. This real-time data can also be viewed from any device including smartphones, computers and status boards to see who is where at any time. Being able to account for all of your employees’ whereabouts at any time is a critical step in enhancing your facilities physical security.

Visitor management. Once your access control system is up and running and all your employees are accounted for at all times, the next step in facility security is controlling and tracking your visitors and contractors. Visitors need to be accounted for as they enter and exit.

There are three options, namely, having an attended station with a physical receptionist who greets and logs in visitors; using an automated, self-serve process that leverages a kiosk; or using a hybrid approach with a kiosk and receptionist or security guard. There are advantages to each approach, and you will need to select which one best suits your organization.

The best practice for a secure facility is for visitors to be given credentials. These can allow for quick identification, clearly state if they need to be escorted, and determine what buildings and doors they will have access to. With proper and thorough security screening and credentialing to visitors, you will have the same level of visibility and accountability for your visitors as you have for your employees. Real-time dashboards, custom reports, and audit trails will be available on a single pane of glass from any and every device, assuring past and present visibility to all staff and visitors that enter and exit the facility.

Security screening. The last two years have made screening both employees and visitors an enormous challenge, as COVID-19 has added extra dimensions to the process. Not only do many organizations have their original security protocols, but now they need a health screening as well. Physical security compliance requirements must be determined for each person that arrives on site. Employees, visitors, contractors, guests, patients, volunteers and delivery drivers are all examples of potential different screening protocols.

Evolving systems now allow an organization to collect information before people arrive onsite. Custom questionnaires, information for background checks, health screenings and even uploading COVID-19 test results can be done in advance. Determining what information needs to be collected and whether it should be done before or after arrival onsite is a big piece of your facility security screening process.

Additional security measures that can be added to the screening process include watching safety videos, signing an NDA, a liability waiver, uploading proof of a certification, having correct ID or passing health standards such as a temperature check. A process will need to be in place in case someone fails a screening. Is entry clearly restricted and are the right people notified that this person was not granted access? Having clear instructions for a failed screening is a critical part of your facility security plan.

Emergency situations. You may have heard the stoic proverb, “Hope for the best, plan for the worst”. While it’s unlikely that an active shooter or violent tornado will hit your facilities in 2022, by planning for these events you can greatly mitigate the fallout if an unfortunate event does happen. An important piece of emergency planning is being able to account for all employees, contractors, or guests in an emergency.

Mass notifications and emergency mustering leverages the real-time insight of who is onsite to effectively communicate important messages and muster only those who are actually onsite.

The days of using a pen and paper to account for employees are long gone. A good emergency mustering system will integrate with your access control system and allow for designated employees to use a tablet to conduct roll calls. Who is onsite when the emergency struck, where they were last accounted for, and have designated meeting spots where they can swipe their credential.

Video surveillance. Facility security should also include video surveillance. This plays an important part in reducing incidents as research shows less crime is committed when premises are being recorded. Video surveillance also gives organizations real-time visibility to key areas of a facility - particularly useful if there is an emergency or some other safety/security incident.

Cloud surveillance using Artificial Intelligence (AI) gives total visibility and an outstanding audit trail. Video systems can be coupled with additional technology to tell you where visitors and staff came and went, what time they did and even who they were with. Video review assists in incident investigation and can be leveraged for pandemic-driven contract tracing.

With so much uncertainty in the world today, facility security has become a topic on most people’s mind. Many people are familiar with the physical security aspect, but security for an organization should go much deeper than that.

To protect from and prepare for security threats and emergencies, it is best to think of facility security like an onion. Access control and physical security is like the core, and additional layers of security, devices, and applications overlap the core to further protect it.

Visitor Management adds a layer of protection to ensure only people who are supposed to be there are allowed to enter, and those people are properly screened and accounted for. Mass notification and emergency mustering provides a layer to ensure the accountability of every human asset in your facility giving organizations a quick and efficient way to alert and count in the event of an emergency.

Video surveillance is yet another layer giving insight and AI to what is going on and where. These layers are important to the overall safety and security of a facility. Years ago, if you had badge access, you were ahead of the game. Today, you need to think much more about safety and security with so many natural disasters, active shooter situations, fraud, corporate espionage and disgruntled employees. Protect your organization by looking deeper than physical access control and look to “Layer 2” and beyond.

This article originally appeared in the May / June 2022 issue of Security Today.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • QCS7230 System-on-Chip (SoC)

    QCS7230 System-on-Chip (SoC)

    The latest Qualcomm® Vision Intelligence Platform offers next-generation smart camera IoT solutions to improve safety and security across enterprises, cities and spaces. The Vision Intelligence Platform was expanded in March 2022 with the introduction of the QCS7230 System-on-Chip (SoC), which delivers superior artificial intelligence (AI) inferencing at the edge. 3