Security Challenge, Securitronics Solution

When Contractors Cause Building Perimeter Vulnerabilities…

Perimeter security, whether at a door or fence, presents unique challenges. It’s the line where unsecure and secure meet, and any breach in that line is a significant vulnerability to the organization.

Security Challenge

Securitronics had the opportunity to provide a building perimeter security solution for a local safety equipment distributor that had ongoing lapses in their perimeter security. Contractors needed to access the building without leaving the rear service door propped open or unlocked.

Securitronics Solution

When it comes to building perimeter security, two common systems are used: access control and intrusion detection.

The intrusion detection system relies on small devices, door or window contacts, to monitor the open or closed state of the doors and windows. This system is usually disarmed once the building is open for business.

The access control system maintains a locked state until a card or biometric credential is presented to a small device near the door. When an authorized credential is presented, the access control system disables the lock on the door.

Now that contractors needed access to the facility, keeping the back door locked or unlocked wasn’t an option. It was time to deploy an access control credential reader on the back door. However, simply handing the contractors the same card credential as the normal company staff wasn’t a good solution either.

In many cases, contractors are allowed access to a building or room through only one specific path, on specific days, and for a specific length of time. By programming the access control system, contractors were given access only through the back door. Their cards only allowed access only on the days and hours they were scheduled to work. If any of those parameters were violated, the system would generate an alert for building management to investigate. For example, if the contractor attempted to use the card credential on a weekend day, the system would deny the card and generate a notification for the facility manager to investigate the following day.

See Something Say Something

For larger organizations with many employees, it’s tough to know who should or should not be in the building or in a specific area of the building. By producing card credentials with identification on them, employees can be assured that the people they’re passing in the hallways are authorized to be there. The contractors were provided special identification cards that not only had their name and picture, but also clearly displayed that they were contractors. Employees could easily identify contractors and know if they were in areas restricted to employees only.

Security Partnership

Each facility, organization, and application are unique. Stakeholder inclusion and project planning will help you to deploy and maintain the best possible safety and security solution for your manufacturing facility. An experienced security partner is an excellent advantage. A security professional can visit your facility to collaborate with administrators, security staff, IT, department leaders, and other key stakeholders. The resulting plan will be a tailored and comprehensive security solution that improves daily and long-term operations for every department.

Leave a Comment