If you are a developer or property manager and you are securing a commercial building with highly valuable assets, cargo or storage, a primary objective is the security of those assets, as well as the safety of building tenants, visitors and individual businesses.
How do we at Acentech design security systems to ensure physical safety and fail-proof security? Here are several examples and some of our top design criteria:
Defining Building Entry Locations with the Owner
This is a critical step in the process of designing security systems. There could be multiple entrances into the building i.e. main entrance, rear entrance and employee entrance, and there could also be exit only doors, parking garages and loading docks. All of these locations need to be accounted for and designed into the building’s security system.
Integrated security systems
There are many components of a security system that allow visitors and tenants safely (and quickly) in and out of the building. Some of the systems are out in the open and easy to spot. To tenants it is comforting to know a security system is there and has your back. Other parts the security systems are invisible, but rest assured, the integrated technology is there, working behind the scenes – analyzing, polling and reporting in real time exactly what it is intended to do.
For the sake of brevity, we’ll be focusing on the main lobby and the secured parking garage. These locations typically feature equipment and security devices that are seamlessly integrated to secure your intelligent building.
The technology involved in building security can be cutting-edge, but it can also tie into an existing system. We know the integration and sequencing across the multitude of systems is crucial and has to be seamless.
Frequent software updates are crucial to prevent cyber criminals from gaining access.
Access controls in the main lobby can be basic. With a card reader at the main door you have access to the building.
In a more secured building you may see free entry into the main lobby with a card reader for after-hours access into the building. In this scenario, once you’re in the building you’ll typically see secured turnstiles to access the elevator lobbies to the building floors. This is now the main secured entry, with access to the building floors.
The integrated security used at the turnstiles can be standard multi-technology card readers, Bluetooth readers, fingerprint readers, iris scanners, facial recognition, etc…and can include added integration for elevators.
There may also be a visitor entry station at the main lobby desk to log in/out or grant 1-day expiring passes to only the floor they have access to. There are systems available that combine some of these features or all of these features. That is where the seamless integration behind the scene happens with these systems described above – but to the users it’s all one unified system.
In one configuration, building tenants can easily approach the turnstiles, look into the iris scanner, gain access into the secured side of the lobby and instantly know which elevator bank / car will quickly get you to the assigned floor.
Pre-registered visitors gain access to specific building areas by providing a government ID and receiving a temporary badge. The badges are single-use, encrypted and will grant access through the integrated technology used at the same turnstiles. Visitors gain access quickly but through different technology at the same turnstiles. There can be access control devices designed to read credentials in several different formats such as bar code scanners, fingerprint readers as well as standard proximity readers, all integrated with elevator destination criteria.
For the parking garage security, this could include either a parking valet, a revenue-based parking kiosk or self-parking for drivers with preauthorized credentials.
Integrating the proper access controls of an automobile into a secured garage could include license plate readers and/or undercarriage detection systems that are tied into a Do Not Enter list.
At Acentech, our security consultants work on scenarios very much like this one. We design and specify security systems to suit your individual project needs. We will work closely with you and the architect to ensure a successful, coordinated design and outcome.
Analytical cookies are used to understand how visitors interact with the website. These cookies help provide information on metrics the number of visitors, bounce rate, traffic source, etc.
The _ga cookie, installed by Google Analytics, calculates visitor, session and campaign data and also keeps track of site usage for the site's analytics report. The cookie stores information anonymously and assigns a randomly generated number to recognize unique visitors.
A variation of the _gat cookie set by Google Analytics and Google Tag Manager to allow website owners to track visitor behaviour and measure site performance. The pattern element in the name contains the unique identity number of the account or website it relates to.
Installed by Google Analytics, _gid cookie stores information on how visitors use a website, while also creating an analytics report of the website's performance. Some of the data that are collected include the number of visitors, their source, and the pages they visit anonymously.
YouTube sets this cookie via embedded youtube-videos and registers anonymous statistical data.
5 months 27 days
This cookie is used by Issuu analytic system. The cookies is used to gather information regarding visitor activity on Issuu products.
Vimeo installs this cookie to collect tracking information by setting a unique ID to embed videos to the website.