Showing posts with label Access Control. Show all posts
Showing posts with label Access Control. Show all posts

Monday, April 15, 2024

Ways to Secure Data Centres

Data Centre Security- 11 Ways To Secure Data Centres 

In today’s world the most valuable assets is data. Together with the data centres that hold and process it, they underpin almost all facets of modern life. This makes data centres an attractive target for threat actors, due to the large and diverse amount of information that supports our national infrastructure and businesses.

The term data centre security conjures images of lines of code, hackers and firewalls. However, there is a huge requirement for physical security within a data centre too.

Data centres are used to house computer systems. They often include backup data, core data, replicated data and on the whole, are huge part of an organisation’s Disaster Recovery Strategy.

In a world where technology impacts many industries, data centres are crucial for businesses and therefore data centres security is a hot topic. Not only should data be protected from potential cyber-attacks, the physical building should be secure.

The security and resilience of your data and the infrastructure beneath it are therefore critical. High-profile data breaches and disruption to services are frequently reported, with each incident, causing operators and data owners potentially huge financial losses in regulatory fines, loss of sensitive IP, downtime, post-incident recovery, security improvements, and perhaps most valuably of all, reputation.

Cyber intrusion methodology evolves constantly, and sophisticated attackers have a strong incentive to defeat the defences you put in place. It should be assumed that at some point your defences will be breached and therefore it is also important to be able to respond proactively by detecting attacks and having measures in place to minimise the impact of any cyber security incidents.

Cyber security focuses on the prevention of data theft or destruction by malicious attacks; however, this is not enough to ensure your data centre remains safe. The building also has to be protected from physical attacks.

Here, we discuss 11 ways you can physically secure data centres.

1. Use Crash Barriers
Stop unauthorised vehicle entry with the installation of road blockers. These have been designed specifically to prevent the threat of potential intruders or terrorist attacks in high-security areas. Varying in height, these road blockers will restrict the entry of vehicles.

2. Use Bollards
Avoid anything impacting and colliding into the building by installing bollards. Install permanent bollards around the building entrances. Alternatively, you could install adjustable bollards that can be lowered to allow access to authorized vehicles.

3. Limit Entry Points
Where possible, try and limit the possible entry points to only one door. If you require additional fire doors, ensure these extra doors are exit only. Limit exterior door handles to prevent any re-entry.

4. Use Security Cameras
Surveillance cameras should be installed throughout the perimeter of the data centre. Consider installing adequate CCTV signage as this can be a physical deterrent.

5. Hire On-Site Security
Threats can happen at any time. You may consider an additional layer of physical security by hiring on-site staff. Having someone monitoring the site acts as a strong deterrent to intruders and can raise the alarm if they spot any potential issues.

6. Build The Data Centre In The Best Location
Plan the best location for your data centre. If possible, choose a location away from the company’s head office or headquarters.

Ensure the data centre is set back from the main road. Consider using landscaping to help form additional protection as trees can help obscure the building from passers-by. Avoid building data centres in locations that are prone to natural disasters such as in a flood area or an area prone to earthquakes or fires.

7. Plan The Data Centre Carefully
When you design a data centre, avoid unnecessary windows. Build walls that are extremely thick as they work an effective barrier as well as improving thermal insulation.

8. Embrace Biometric Technology
Biometric technology is increasingly popular and is now part of our every day lives. Install biometric identification systems in the building to control access. This is often a fingerprint recognition device. In addition to biometric technology, ensure multi-factor authentication is in place. This method utilises two or more authentication methods. For example, someone may use their fingerprint but will still need to type in a pin code or show an access card.

9. Install Perimeter fencing
Data Centres have access to unprecedented levels of data. It is important to protect data from digital hackers, but the data also needs to be protected in the physical sense. Therefore, security-rated fencing is of the utmost importance for these buildings and keeping data secure. As a physical security breach has the potential risk just like a digital attack would.

Perimeter security is also vital. Have strong fencing around your entire site. Ensure the gates and barriers are placed where surveillance equipment, a guard, or preferably both are in place.

This is why, at SSA INTEGRATE, we understand how vital data centre fencing is in the wider security strategy of sites. The ultimate goal is to detect potential threats early on and then allow enough time to intercept a risk or threat.

10. Use Access Control Equipment
Data centres should adopt a Zero Trust Network. This means that no one is trusted until they can prove who they are. Access control equipment is an important element of implementing this.

While it may seem simple, access lists should also be provided to ensure that only approved individuals can access data centre. Ensure these lists are kept up to date and are stored securely.

11. Install a Sophisticated Alarm System
Alarm systems are costly. However, these costs are outweighed by the potential benefits. Some systems are linked to local police stations or security companies. Others are silent, but trigger alerts to key staff. Whatever the system you choose, it will bring peace of mind.

People value physical security. They trust places that are secure when they can actually see forms of security such as gates, barriers and alarm systems.

Many companies may forget about the physical form of security when it comes to data centres as they are concentrating on the risk of cyber threats. Although cybersecurity is vital and needs to be as sophisticated as possible, teaming this up with physical security can ensure your data centre is as secure as it can be.

As data centres evolve in the future, the need for physical measures will remain vital. However, physical security measures may also evolve. Having a multi-layer approach that considers both physical and cyber elements will ensure the best protection.



Thursday, February 1, 2024

Useful Measures to Prevent Unauthorized Access

Useful Measures to Prevent Unauthorized Access 

Causes of Physical Security Breaches

Unauthorized access may be gained by an outsider as well as by an in-house employee. Both physical access to a building by a stranger or entry to a server room by a staff member with no permission are examples of unauthorized physical access. Although a security system may have various loopholes, most commonly unauthorized access is gained thanks to:

·        Tailgating – i.e. an act when unauthorized people follow through a door someone who has an access card

·        Weak doors that can be easily levered or broke in through

·        Smart cards which can be easily hacked

·        Lost or stolen keys

·        Portable devices such as laptops, mobile phones and USB drives

·        Unlocked server room doors

·        Insider threat, etc.

 

Any of the above mentioned loopholes create security gaps which can be taken advantage of. Because of an unauthorized access companies may be subjected to physical theft of devices and equipment, compromise of electronic information, identity theft and vandalism. What’s more, human lives can be endangered too. Therefore, it is important that a company addresses any of the existing loopholes and prevents possible threats.

How to Combat Unauthorized Access

First and foremost, you need to define how unauthorized access can occur at your company and develop a program aimed at eradicating any possible loopholes.

Different levels of security are crucial to prevent unauthorized access. Robust access control system, employee control and emergency response help prevent unsanctioned access to facilities, devices and information.

·        Begin with perimeter security. Make sure you use fences, gates, guards and video surveillance around the perimeter.

·        By installing motion detectors and alarm systems you can attain an additional level of security.

·        Implement identification cards to verify people entering the premises, including visitors, contractors and personnel.

·        Lock up areas with sensitive information. It is also advised to enforce delay control on server room doors. Check out our guide for server room requirements.

·        Conduct background check of employees before onboarding. "Onboarding" is the process of integrating a new employee into an organization, training and orienting them.

·        Make sure you have a new hire forms checklist thanks to which you can verify your new employee’s work eligibility.

·        Set up different access control levels. Each employee should be granted permission to enter facilities depending on their role within an organization.

·        Use cable locks for computers in order to prevent theft of electronic devices.

Desktop locks are aimed at protecting computer equipment from theft.

·        Lock up sensitive files or USB drives in safes or drawers.

·        Develop an emergency plan and train employees to troubleshoot possible security issues and inform of any suspicious behavior they notice.

It is important to remember that security starts at a physical level. By implementing measures aimed at preventing unauthorized access you can protect your assets, information and personnel from internal and external security threats which otherwise might have a detrimental impact on your business.

Sunday, October 15, 2023

Maintenance of the Security Bollard

Maintenance of the Security Bollard 

A high security bollard or entrance control bollard system is designed to deter or completely stop unauthorised entrants, assets or vehicles whilst enforcing the use of an access control system to ensure the ‘one token one person’ rule applies. Bollards are used to protect areas that are either completely pedestrianised, or to restrict vehicle access. Bollards also act as a great security measure for businesses and shop fronts too. Bollards are made from sturdy materials, they can sometimes be damaged or develop wear and tear over time.

The weather can have a large impact on the condition of a bollard. Going from hot to freezing temperatures can cause cracks over time. Likewise, long periods of heavy rain over the years can result in imperfections, especially where wooden bollards are concerned. That’s why it’s important to check your bollards regularly, especially if there has been an extreme change in weather. Metal bollards are less susceptible to weather damage, but over the years it may create some issues.

Bollards are usually found next to roads, or within car parks, and this means it’s not unlikely that one or two will come in contact with a vehicle. Bumps and scratches can occur, and over time this may lead to permanent damage to your bollards. A CCTV system can help to document any accidents around your perimeter and to check the severity of the damage. If any serious damage is caused, it is always best to replace the bollard.

Learning to check your bollards for damage is a great way to improve their overall maintenance. Regularly inspecting them for cracks and breaks means that they can be fixed quicker and no lasting damage will occur. If you have had your bollards for a long time, the exposure to various weather conditions may have caused them to rust or for parts to loosen. With this in mind, make sure to check them frequently. Dirt can also build-up on bollards, so giving them a quick clean every now and then will improve their performance greatly.

Safety Instructions

All personnel who are applicable for the operation of the bollard, including back up personnel, must be thoroughly familiar with the operation and safety regulations.

Any maintenance and repairs must only be implemented by certified technical personnel.

No persons and/or vehicles are allowed into the area over the blocking element when the bollard is functional.

The closing element must be extended early enough that approaching vehicles can still stop in time.

If the bollard functions are activated with neglect to the afore mentioned points the manufacturer cannot be held liable for any damages that may result to any person and/or property.

Before the maintenance work can begin all safety precautions must be adhered.

Monthly Maintenance by the Operating Personnel

After the control the stated changements in comparison to the original condition should be eliminated by corresponding counter measures.

The following points are to be visually examined:

Barrier bollard

1) Clean any contamination on the annular gap between the bollard and the cover of the standpipe

2) Check the extended blocking element for damages, e.g. impact, allow damage repair

3) Check for faultless bollard movement and pay attention to any unusual noises

Drive Unit

1) Check the hydraulic screws, oil tank and hydraulic units for leakage

2) Check the intactness of the hydraulic hoses

3) Check the oil level (level should be within the mark)

4) Check the intactness of the cover seals

First maintenance service by a machine expert

The first maintenance service should be made by a machine expert within the 1 quarter after the installation.

A. Barrier bollard

a) Clean bollard completely from dirt

b) Screw-out bollard cover and examine fixation of the hydraulic cylinder

c) Examine the piston rod and the hose connections of the cylinder on leakages through light beam of a pocket lamp.

d) Examine speed position above one -way restrictor and adjust once or if necessary the approximate direct running of the bollard running-out movement.

Bollard housing

a) Screw-off cover of the bollard housing and examine fix position of the proximity switch.

b) Clean cover and inner space of the bollard housing and clean if achievable from dirt.

c) Note, if penetrated surface water has flown above the drain channel, eliminate eventual obstructions. There should not be water in the bollard housing.

d) Note purification degree on the bottom of the bollard housing. At bigger dirt, especially in the construction phase.

Drive unit

a) Clean drive unit completely from dust and dirt.

b) Examine adjustment of the pressure limit valve for the operation pressure Manometer indication until. 50-60 bar allowed. 

Semi-Annual maintenance service by a machine expert

The semi-annual maintenance is to be performed by a machine specialist. It covers the visual examination as described under Point 1 and the following additional work:

Blocking Element

a) Clean the entire blocking element

b) Unscrew the blocking element cover and check the hydraulic cylinder mounting as well as checking the tightness of the electrical limit switches

c) Check the piston rods and hydraulic cylinder hose connections for leakage (use a torch / flashlight)

d) Check the approximate synchronisation of the bollard drive-out movement in multiple systems, if necessarily adjust the speed at the one-way restrictor.

Standpipe

a) Clean cover and interior, within reach, of any contamination

b) Check the drainage connection, if necessary remove any blockage

c) Determine the degree of pollution on the bottom of the standpipe. With large soil accumulation, particularly in the building phase, cleaning may be necessary.

Drive Unit

a) Clean the dust and dirt from the entire hydraulic unit.

b) Check the operating pressure, if necessary adjust the pressure release valve (approx. 50-60 bar)

Extensive maintenance service by a machine expert

The extensive maintenance service is after 1000 operation hours, but at least each 2 year. Additionally to the first maintenance service the following works should be made.

a) Examination of all functional components, combinations and screwing on integrity and fix position.

b) Exchange of the hydraulic liquid. Open filler cap and guide the hydraulic liquid into the sanitation container.

c) Use the unused hydraulic liquid, of the type of the first filling, to be bought from the bollard manufacturer.

d) Make functional test and if necessary, proceed to adjustment.

e) Examination of the control by an expert. Examine condition of the control and perfect working procedure of the electrical components.

The observance of the maintenance intervals and the execution of the maintenance works guarantee a free disturbances operation and maintenance of the installation.

Get in touch

Here at Expert Security we offer a range of bollards, along with maintenance service to keep them in top condition. Our maintenance cover includes a professional service, provided by our repair engineers, to regularly check your bollards. This will reduce the risk of malfunction or damage. These routine checks will be scheduled in advance and afterwards we will provide a range of detailed reports surrounding the visit. For more information on any of the security options above, or for further advice on how to protect your business premises from criminals, please contact us here or Email us on ssaintegrate@gmail.com

Monday, September 18, 2023

Sliding Gates vs Swinging Gates

Sliding Gates vs Swinging Gates 

Gates add value and security to your property. They’re also your main control for access to who goes in and out and serve as a point of entry to your home, business, and land.

The first electric gates were invented in 1881, and the benefits of the automated gates have also evolved, catering the needs of each generation of homeowners and business owners to increase the security and the convenience of opening and closing an entry point structure. Automatic gate systems use electric motors to open and close gates through the use of a transmitter.

When it comes to perimeter defences, the first thing that will likely jump to mind is the image of a security gate, and rightly so. Security gates are often the first line of defence for many businesses when it comes to keeping intruders away, establishing a strong perimeter, and sending out a message to criminals.

However, when planning defences for a site, or considering upgrading your existing measures, it’s important to think carefully about your needs and your site capabilities. Let’s take a look at two of the most popular options of gates and how they compare.

Swinging Gates

Swinging Gates are an excellent option for many businesses. As the name suggests they swing open and shut in a wide arc. Often priced cheaper than sliding gates, they typically don’t include motors or electronics. Swinging gates don’t require concrete work or steel beams, they are low maintenance and make little noise during operation. This means that they are well-suited to isolated or rural sites, or large expansive sites where access to the grid is more limited.

If considering swinging gates as a solution for your site, you should think carefully about the available space on your premises. Swinging gates need enough space to open internally and externally in a wide arc and so might not be suitable for some sites where space is at a premium. They might also be less suited if you have particular needs for high-tech upgrades such as access control equipment or other electronic support.

Sliding Gates

If you are looking for gates at a site where space is less readily available then sliding gates may be a more sensible solution. Rather than opening and closing in an arc, sliding gates slide in and out along a track or trackless cantilever system, which both employ less of a footprint.

Sliding gates are often seen in more commercially-led settings, entrances, and residential driveways. They can be employed on rough ground and even on sloping ground if required. They are a good choice if you operate in a setting that has high-wind speeds and other unpredictable weather factors.

Unlike swing gates, sliding gates can be upgraded with access control equipment such as electronic keys, cards, fingerprint biometric readers and intercoms. These additions will always make a site more secure, however, they do come with added costs.

Confuse as to what type of gate to choose? You might wanna consider these insights.

The main advantages of sliding gates are:
• They aren’t affected by wind
• They don’t take up space on your driveway when opening and closing
• The gate can slide from the left or the right, depending on where you have space
• If you don’t have the space required, there are other types of sliding gates, such as telescopic sliding gates or bi-parting sliding gates, that take up less space.

The advantages of double swing gates:
• A double swing gate takes up less area when in operation
• They are less affected by wind
• As the weight is distributed between two gates, there is less stress on the swing gate motor, posts, and hinges.

The advantages of single swing gates:
• There are only one gate and one set of hardware to automate it, so you’re up for less installation and maintenance (assuming you purchase quality parts, as the load on all parts will be greater).

General swing gate fitting information:

• With swing gates, there are two options as to where to install the hinge. You can install the swing gate opener on the sides of your posts parallel to each other facing inwards, or on the side that faces into your property. If you do the latter, the fixings are hidden by the posts and the swing gates take up less space. 
• If your driveway slopes up from the road and there’s no room for a sliding gate, you can install a swing gate that opens outward. Just make sure it doesn’t interfere with public spaces.

Get in touch

Arranging effective perimeter security is not something that you should go at alone. No matter the size or nature of your business, we can provide you with a free, no-obligation quotation and feasibility survey to assess the security requirements of your organisation. For more information on any of the security options above, or for further advice on how to protect your business premises from criminals, please contact us here or Email us on ssaintegrate@gmail.com

Friday, September 1, 2023

Security Integration management systems

Security Integration Management Systems 

Security systems are changing at an ever-increasing pace and are becoming standard Information Technology (IT) products running over a Local Area Network (LAN) or Wide Area Network (WAN). As a result of using standard protocols such as Transmission Control Protocol/Internet Protocol (TCP/IP), the manufacturers to develop new generations of integrated systems. These systems are called System Integration as they bring together the management of all aspects of an organisation’s security. In recent years, the market for security equipment has realized the immense merits of integrating different components in a security system. However, true integration may be offered by all the manufacturers in the field today. A truly integrated security system combines the various components and yet they are all part of a more sophisticated and bigger system.

Some people use the term 'integrated' to describe a multiplexer combining full screen and multi screen images. Or a control desk containing an integrated intruder alarm PC, an integrated fence alarm PC and an integrated CCTV PC sitting next to one another. This is not true integration.

It is possible to integrate components like a public address system, CCTV, fence alarms, intruder alarms, fire alarms (life safety) and access control system within a single system. The system can be multi-station networks or even a single PC. All these components should interact with one another as a single entity. For example, whenever the fire alarm gets activated, the screen of the Visual Display Unit should pop up a new text window where detailed instruction should be given on what to do next. Simultaneously, the integrated system may release the doors meant for fire exit and display those CCTV cameras, through which the operator can view the affected area so that the operator in question can engage in a communication with the other staff and do not have to take the help of any public address system.

It is not always necessary to purchase all of the components of a system from one supplier. Manufacturers of Security Management Systems realise that the customer wants choice and will often link to components from other specialist manufacturers. Many manufacturers provide integration modules and protocols such as BACnet and OPC, and data integration methodologies such as eXtensible Markup Language (XML), ActiveX and others, which can in theory link to almost any business system. You will need to talk to individual suppliers to discover what development tools such as Software Development Kits (SDK) and Application Programming Interfaces (API) are available for integrating systems. Yes, the system should be able to function with the help of a battery backup though the duration of this backup time may vary according to the type of panels used within it. In my experience this has not been an issue, but some manufacturers are very cautious to whom they release this information. If you are a competitor it is almost impossible.

Even when protocol has been received 90% of the time it is either incorrect, incomplete or even misleading! It is essential to test product before installation, I know it is an old fashioned idea but it is really nice to see the system actually working.

Opportunities of System integration

There are a number of advantages to be gained in both the security and commercial aspects of designing and adopting an integrated system. This section lists some of the advantages that may be considered when combining separate systems into an integrated solution.

Access Control Systems (ACS)

Access Control is typically specified to provide protection to both property and employees. Generally it is thought of in terms of managing doors. However, it often extends to public areas when coupled with turnstiles, gates and barriers, or highly sensitive areas when coupled with biometrics.  If the access control and intruder alarm systems are linked together, the access control system can be programmed to automatically change, based on the type of alarm that sounds. By integrating Access Control with other systems many advantages may be realized. For example:

Fire Alarm mustering – know where your employees are at a given time.

Know which doors / areas employees are entering, or trying to enter.

Link CCTV images with access control events.

Link Time & Attendance monitoring using the same badge / token software.

Link Visitor Monitoring with Access Control & CCTV using badge / token software.

Increase security through systems such as dual card access or access using a biometric technology.

Intruder & Hold up alarm system control functions can be managed by the Access Control system.

Logical Security

Logical access control is the brother of physical access control but is often limited to secure PC logon. Integrating these two elements can significantly increase your security. For instance, you can restrict PC access to only those who have a smart card and use this to logon to your IT network. Alternatively, you can inhibit network logon if the person is not in the building, further enhancing your security.

One example is to use the CCTV system and access system to monitor and lock doors during a denial of service (DOS) attack at the same time as sending a message to the security guards. Quite often physical and logical attacks go hand in hand.

Time & Attendance (TA) monitoring

The same badge/token used to identify a person in Access Control can register them on and off work with Time & Attendance monitoring. Also as more integrated software systems become available, use of the same software to handle Access Control, Time & Attendance and Visitor Monitoring can be achieved. Remember however, that just because a person went through an Access Control door does not mean they are registered for work, especially under Working Time Directive (WTD) rules. You will need separate T&A clocking stations, albeit on the same network, to monitor working hours and software to calculate employee hours, monitor absences and WTD hours and infringements.

Human Resources (HR) / Payroll

Why enter data twice? When a new employee joins a company his personnel details are often entered into both the appropriate HR system and then again into the security system. By integrating these two systems, a subset of the employee data can automatically be transferred into the Access Control System when an employee joins. Alternatively, when an employee leaves, his rights can be automatically deleted from the Access Control System, again reducing effort and increasing security.

CCTV Systems

By integrating CCTV and other systems such as Access Control, the benefits of more than one system can be coupled to provide a more efficient and usable solution for the end user. IP camera can be integrated with Motion Sensor not only that If IP camera has I/O port you can integrate with other systems like, Hooter, Auto dialer etc. Through Video management intelligent Software you can get face reorganization, license plate reorganization etc.  For example:

Live camera views can be integrated with the Access Control Software, equally Access Control or other data can be integrated with the CCTV system.

Access Control and other security detection systems can initiate pre and post-event video recording, linking the video recording with the event information. This makes searching for events on the DVR/NVR more effective as only the event needs to be searched, for example ‘Door forced – Stores Door’ or ‘Zone 1 – Perimeter breached.’

Track individuals and record their access details against the recording to track suspect users or stolen card users.

Initiate camera presets when specific pre-determined events occur, e.g. when entering a room in a bank, switch the camera to zoom into the door to identify the individual.

Use CCTV with Time & Attendance system to detect / eradicate ‘buddy-clocking’, a practice where employees clock each other on and off work.

Intruder Alarms Systems (IAS)

By integrating intruder with other systems, the benefits of more than one system can be coupled to provide a more efficient and usable solution for the end user. For example:

Set / unset the intruder system using an access reader. No need to use the intruder keypad.

No entry delay time if main door forced. The entry timer is bypassed thus providing an instant alarm.

Disabling of access readers when the intruder system is in the armed state, to prevent false alarms due to unauthorised entry into an armed area.

Using an occupancy count from another system, the Intruder & Hold Up Alarm system can be notified that there may be persons present in the building when the system is being set.

External Perimeter Detection

One of the fundamental objectives of a security system is to provide protection at the outermost perimeter of a property. A perimeter intruder detection system can be used, linked with CCTV to provide early warnings and increased security through verification in the event of a breach. For example, external doors could be automatically locked if the perimeter system detects an abnormal event.

Fire Detection & Alarm Systems

Fire protection / Detection systems have traditionally been isolated from other building management and security systems. By integrating fire with other systems, the benefits of more than one system can be coupled to provide a more efficient and usable solution for the end user. For example:

In the event of a fire all emergency exit doors on the fire escape route need to be automatically released from an electrical point of view, but physical quick release locks may be in place to maintain security and still allow people to escape. It is common practice to install a relay in series with the electric locking mechanism controlled by the fire panel. An alternative is to feed a fire input into the Access Control System, which then automatically releases the appropriate electric locking mechanisms. The proposed link between the Access Control System and the fire system should be evaluated as part of the fire risk assessment.

In addition to providing hardware control during a fire situation, it may be necessary to provide a ‘roll call’ or ‘muster’ report to list all people in the building at the time of the fire alarm.

PA system (PAS)

In general IP paging and intercom systems are used to direct people in emergencies, control doors and control other situations such as crowd control. However, integrating such systems with others leaves the door open to new uses and can push a technology to its full potential. For example, integrating a campus’ PA system with security systems such as video surveillance could give campus security operators more control over emergency communication. Paging can be integrated with IP camera systems. Small amplifiers are used to power speakers that can be used with the cameras.

It is also important that the video management software (VMS) supports the audio. Some VMS will provide an alert if they detect a button activation from the IP camera. The VMS then allows the security person to see what is happening and then talk to the person near the IP camera.

The Digital Acoustic intercom system is independent of the VMS and uses its own Windows paging software. In this case, the security person can receive an alert from an intercom and be notified on their Windows computer. The software also allows the security person to view a nearby IP camera. This is not quite as integrated as the first method, but can provide additional security.

PA Controller should be integrate with Fire Detection system, in case of fire PA system automatic start announcement to evac said area.

Visitor Management Systems (VMS)

For many companies and organizations, a manual paper-based VMS will suffice, providing visual identity of visitors. However, computerized systems linked to Access Control and Time & Attendance systems are the natural bedfellows for integrated security systems. These not only print ID passes, but can also incorporate biometric identification and the scanning of visitor/contractor documentation, licenses, certificates and insurance certificates.

Lift Control

By integrating lift control with the access control system, access to certain floors in a building may be

Restricted, particularly outside normal working hours or in multi-tenanted buildings. To monitor of lift you can fix CCTV Camera which is integrate with Access Control.

Car Park Management (CPM)

Where access to a car park is restricted, the ISMS can automatically monitor the number of spaces left for each tenant or department and regulate access accordingly. For example:

Visually through CCTV.

Audibly through an intercom system.

Automatic number plate recognition.

Access Control tokens.

Guard Tour System (GTS)

By using a guard tour package that integrates with the access door readers can be used to define and monitor a tour by a specific guard, providing a real time indication if the guard does not reach a set point in time (or even if he arrives too early) – equally integration with the CCTV system can provide visual verification of the guard’s location and wellbeing. Many Time & Attendance systems incorporate Guard tour functions as part of their software package.

Building Management Systems (BMS)

Building management systems are responsible for monitoring and controlling the environment of a building, for example lighting control, heating and ventilation (HVAC). In the current climate of energy saving, why leave lights on when an area is unoccupied? By integrating Access Control Systems with BMS systems, the lighting can be automatically controlled by recording when people access an area. The system can also be configured to control the heating by reducing the room temperature when no one is present rather than leaving it on all day and off at night.

Electronic Point of Sale (EPOS)

The logic of integrating security systems together is evident, however if information from systems such as EPOS can be interfaced then a powerful security solution for applications in the retail market and casinos can be deployed.

Data sent from an EPOS system can be overlaid on a live video display, allowing operators to view the camera feed and till transaction simultaneously. The transaction information and alarms enerated by the EPOS system can be bookmarked and recorded alongside the video. This facilitates visual identification of an incident in both real time and through post-event analysis. Powerful transaction analysis can be undertaken on the stored data, for example, finding out when a particular credit card was used by searching every till in a store or across all stores from the head office.

Conversely, recorded video can be searched using a thumbnail feature, which displays a video still image for every transaction, allowing the operator to quickly identify the relevant footage. Evidential quality video clips and associated transaction data can be exported for investigation or use in court.

Alarms generated by the EPOS system, such as ‘register drawer left open’, ‘refund’, or ‘large dollar amount’ can automatically trigger a number of events, including displaying the nearest camera to the specific till and pinpointing the alarm on an interactive map.