search.noResults

search.searching

saml.title
dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
determine the level of security the system needs to provide. In today’s world, for some organisations there are increased risks from potential attacks, perhaps terrorist or geopolitical-related threats. Additionally, there may be an increased requirement on compliance with regulations such as data protection and an auditable access control system may be essential.


Understanding the business aims


It is important to have a clear understanding of the needs of those working in or occupying the building or space. The access control system must be fit for purpose for users and their buy-in is essential once the system is operational, otherwise the system will fail. An understanding of how and when the building or space is operational is essential. What business is located here? How is this carried out? Who can have access and at what times and in what places? What other business imperatives do you need to think about? Does the location need to be welcoming, modern, sophisticated, quick and easy for visitors? Or is this a secure location that will have few visitors and needs to maintain a low profile and a high level of security?


Senior security consultant Danny Moody says: “For me, one of the most important aspects when assisting a client with an Access Control System (ACS) replacement or upgrade is fully understanding their requirement and ensuring that the system specification considers the context. For example, the specification for a local library system will differ from that of an iconic entertainment venue. The capability, scale and security requirements of the systems are going to vary and it’s important this is captured. Each organisation faces differing security threats and requires different operational capabilities from their systems.”


The important elements in an access control operational requirement specification


Using your risk and threat assessment and an understanding of the business requirements for controlling access, you will be able to decide whether you need a physical access control system. If the answer is yes, then an operational requirement document can be written using the results of this research.


The related NPSA guidance suggests this includes:


• A clear definition of the area being controlled – including a site plan and drawings of the layout of each building, showing all proposed points of entry and exit.


• An explanation of the different types of user who will access the site – for example, staff, contractor, visitors – with information on numbers for different times and days, including the peak numbers.


© CITY SECURITY MAGAZINE – WINTER 2023


• How you want control restrictions to be applied – sometimes sites and buildings are divided into zones with varying restrictions on each.


The guidance also suggests that your specification lists any design constraints to be adhered to, such as:


• Aspects of the site, such as Listed Building status with the need for Heritage Planning or local authority approvals.


• Aesthetics of the building or area to be protected.


• Locations with higher security requirements, for example, IT server rooms or other areas with high value assets.


• What plans are on the horizon? For example: How long will this system be in place for? What’s the lease on this building?


Integrating with other security measures


The specification also needs to take into account other security measures that an access control system integrates with. The overall access control system could be considered to include outdoor perimeter security – such as fences, signs, CCTV, patrolling security teams, lights, motion sensitive systems – and indoor security measures – such as turnstiles, doors and locking systems.


Some electronic access control systems will provide the means to integrate with some of these measures. For example, an intruder spotted on a CCTV system may trigger the automatic locking of a number of internal doors; a gate left open may trigger an alarm that is displayed on the access control system control panel.


Integrating an access control system with other electronic security systems can bring advantages. Danny Moody shares some examples: “Integrating with a Video Management System (VMS) can enable video verification upon alarm (VVUA) which provides additional functionality to security control room operators. VVUA will play back a set amount of CCTV footage (for instance, five seconds prior to alarm activation) from a camera covering the door generating the alarm (door forced, held open etc.) allowing the controller to accurately assess the situation prior to sending a security officer to investigate. VVUA can also be used in conjunction with panic or intruder alarms if they are integrated into the access control system.”


Another type of Integration is known as Active Directory Integration where the ACS cardholder database is populated with employees as they join the organisation. When a staff member subsequently leaves, they are prevented from logging onto the IT systems and simultaneously blocked in the ACS. Even if they retain their ACS credential/card, they cannot use it to gain entry to the building.


www.citysecuritymagazine.com


Security access control systems can be fully integrated with other systems across a site like lighting and elevators. These locations, sometimes known as Smart Buildings, can allow for easier management of buildings and the ability to take advantage of the information gathered. For example, an understanding of occupancy levels and daily movements helps building managers make efficiency savings in power usage.


Choosing a provider


Choosing a provider can be challenging. You need a one that understands your organisation and its security concerns.


Consider these questions for the system proposed:


• How easy is this system to install?


• How well will it integrate with our security measures?


• Can existing cabling be used?


• What departments or personnel will need to be involved?


• Once installed, how easy is it to use?


• Can the system be easily upgraded as requirements evolve?


Consider these questions about the provider:


• Do they hold any external verifications. For example:


- NSI Gold certified company – NSI certification for security and fire protection companies.


- Cyber Essentials certified company: About Cyber Essentials.


- ISO 14001 (Environmental Management) certified company.


- ISO 9001 (Quality Management System) certified company.


- ISO 45001 (Health and Safety) certified company.


- Constructionline Gold member. • What is the after sales support provided?


• Can they provide case studies for similar projects?


Getting the right security access control system requires careful consideration, with a clear understanding of risk, the business and other systems in place. The time and effort spent in the planning stages can ensure your success.


Andrea Berkoff Editor City Security magazine


advertorial article


>


12


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36