Self-Storage Security
Looking At The Data BY CHADWICK MACFERRAN The rate of change within the self-storage industry is increasing exponentially every year. With more storage providers, vendors, and expectations, we see a constant growth in new value-added amenities, operational models, and technological innovations.
D
ecades ago, all you needed to secure a facility were the four walls
of a unit, a padlock, and an owner or manager not too far away to keep a watchful eye on the property. This kind of approach focused simply on the perimeter (and a bit on people’s good intentions) with fences, gates, and lighting. As requirements evolved in complexity, so did all of the various sub-components that go into better securing the outside of a facility. Part of this necessity for innovation led to the founding of PTI Integrated Systems in the late 70s to provide a more efficient way to control access at the gate.
Since then, operations have contin-
ued to grow more complex to improve efficiencies and protect their invest- ments and their tenants’ possessions. This includes leveraging a layered
security approach, including controlling access and monitoring activity through- out a facility rather than just at the gate. Segmentation like this creates more secure spaces like:
• Incorporating access points at the entrance to separate buildings or areas, a designated boat and RV parking area, for example.
• Leveraging an access control-enabled elevator or door within a stairwell for limiting access to different levels of a building.
• Creating high-secure areas of a prop- erty like a hallway equipped with extra cameras or other security components.
This approach creates multiple layers of protection while providing redundancies
44 September 2022 •
MiniStorageMessenger.com
in case one component is bypassed or compromised. As many operators quickly discover, it isn’t uncommon to have a current tenant or someone with a valid gate code be the perpetrator of theft or vandalism.
In recent times, we have seen this
layered security approach move all the way to securing a unit with greater adop- tion for technologies like alarms, smart locks, and motion detection. With so many different components available, and a growing level of complexity to implement them, it’s important to get strategic and evaluate each layer as part of a larger strategy. By taking a strategic approach to what you want your security components to achieve, you’ll be able to map out a system that fits your specific needs. In this article, we’ll talk more about the ways to effectively plan for,
Page 1 |
Page 2 |
Page 3 |
Page 4 |
Page 5 |
Page 6 |
Page 7 |
Page 8 |
Page 9 |
Page 10 |
Page 11 |
Page 12 |
Page 13 |
Page 14 |
Page 15 |
Page 16 |
Page 17 |
Page 18 |
Page 19 |
Page 20 |
Page 21 |
Page 22 |
Page 23 |
Page 24 |
Page 25 |
Page 26 |
Page 27 |
Page 28 |
Page 29 |
Page 30 |
Page 31 |
Page 32 |
Page 33 |
Page 34 |
Page 35 |
Page 36 |
Page 37 |
Page 38 |
Page 39 |
Page 40 |
Page 41 |
Page 42 |
Page 43 |
Page 44 |
Page 45 |
Page 46 |
Page 47 |
Page 48 |
Page 49 |
Page 50 |
Page 51 |
Page 52 |
Page 53 |
Page 54 |
Page 55 |
Page 56 |
Page 57 |
Page 58 |
Page 59 |
Page 60 |
Page 61 |
Page 62 |
Page 63 |
Page 64 |
Page 65 |
Page 66 |
Page 67 |
Page 68 |
Page 69 |
Page 70 |
Page 71 |
Page 72 |
Page 73 |
Page 74 |
Page 75 |
Page 76 |
Page 77 |
Page 78 |
Page 79 |
Page 80