Security Solutions - Close the Security Gap.
Security Solutions for Risk Mitigation
Modern demands in security are higher than ever, and not without good cause. In today's world, the list of potential risks to your business are huge and include events that can happen faster and be far more dangerous than ever before. Potential security risks include:
- Active shooter events
- Cyberattacks
- Terrorism
- Activism
- Protests
- Workplace violence
Trends in Security
We have seen a global trend in changing legislation concerning security. In the USA for example, Homeland Security has already passed legislation to protect critical infrastructure from increased risks. This legislation includes manufacturing, energy, transportation and technology industries.
We see identifying and mitigating threats at the entry point of a building hugely important in preventing unauthorised access. Moreover, if a company neglected to take reasonable precautions, it could be held liable for the resulting damages of earlier stated incidents.
Choosing the Right Security Solutions
To protect your business against these risks, you should include physical access as a part of your overall security solution. Security solutions range from hiring security guards to implementing camera’s and access control devices. All of these security solutions are commonly utilised, yet are also widely ineffective in mitigating unauthorized access. - Guards get distracted and camera’s will only alert you after the incident has happened.
Physical security entrance solutions don’t get distracted and successfully mitigate tailgating every time. So, what physical entrance solution should you choose?
The Physical Security Entrance Solution
Keep an intruder where they belong - *outside*. If an intruder can infiltrate a building’s entry points, then all other security measures are simply reactive. Security entrances are the only proactive solution that addresses the risk of unauthorized entry (including tailgating and piggybacking) Often, these security breaches are regarded as the same, but there's a significant difference.
Tailgating
Tailgating is one of the most common security breaches at entry points, and is defined as "an unauthorised person following an authorised person into a building”. Tailgating can occur innocently between people who know each other, for example when the first person helps a known colleague who's forgotten their access card. However, tailgating can also occur when an unknown second person tries to sneak in behind an authorised person.
Piggybacking
Whether the intention is innocent or dishonest, piggybacking is an act of collusion by two people attempting to enter through a security entrance at the same time, using only one authorised credential.
While tailgating and piggybacking are often used synonymously, they are different when referring to security entrances. High-security doors work to combat collusive piggybacking through the use of sophisticated overhead sensor systems that can detect when more than one person is inside a compartment designed for one.
Can User ID Prevent Piggybacking and Tailgating?
Creating a secure entry involves granting and managing access to areas within a building, ensuring that only authorised individuals can enter. To do this, companies use identification methods, such as fingerprints, four-digit codes, hand or facial geometry, and so on. Once a digital identity is created, they can manage each user’s access to areas or zones within a building.
The most sophisticated security solution is ineffective if the entry is not properly secured. If a user is permitted to present their credentials at a swing door, the risk of an unauthorised entry has not been properly addressed. User ID alone cannot prevent piggybacking or tailgating.
But when identity is coupled with a physical security barrier, instances of tailgating and piggybacking are addressed upfront, and risk can therefore be accurately managed.
Scalable Security
Not all security entrance solutions are equal. Depending on your requirements, you may need a low, medium or high security solution.
What are security levels?
First of all, when we talk about the level of security offered, we are talking about the ability to control the physical passage of users in and out of a secured area. We break this ability down into three levels based on ability to prevent, detect or deter unwanted access as follows:
1. High Security – Tailgating / piggybacking prevention
Very high levels of detection discrimination and a very high level of physical prevention. The very design or operation of the product makes tailgating or piggybacking impossible or extremely difficult. Examples of such products are security revolving doors or security portals where they can physically only allow one person through. No supervision is required here, however, cameras are almost always utilised for monitoring in case of suspicious loitering activity nearby.
2. Medium – Tailgating / piggybacking detection
Accurate detection and a physical deterrent providing a moderate level of physical prevention. A speed gate has sensors installed that will sound an alarm when tailgating occurs. This level of security allows for supervision from a further distance and potentially fewer supervisors, however, it should be planned as to how a supervisor should respond when tailgating occurs. Is anyone else notified to confront the tailgater? Do cameras zoom in to identify the users in the area? These are the sort of questions that need to be asked to determine adequate security levels with this range of products.
3. Low – Monitoring or controlling traffic (Keeping honest people honest)
Upon authorisation, users are forced to be deliberate and in some cases, slowed down through a physical barrier, such as a waist-high turnstile or a gate. This situation requires supervision at all times because the physical barriers can be defeated by either jumping, climbing, tailgating, or piggybacking. The benefit of a low level of security is primarily very high throughput and controlling crowds – such as at a museum, a stadium, mass transit, etc. Supervision is required to prevent or quickly respond to attempts to defeat the barriers.
Thus, we have three levels of security:
- Prevention (high security level)
- Detection (medium security level)
- Deterrence (low security level)
As the level of security increases, the amount of supervision required decreases, which has a financial benefit if not an operational benefit. As a result, you can achieve an ROI by the reduction of supervision staff or allocate them to other areas of need in the building. In addition, you can mitigate physical violence, loss prevention risk, and provide superior evidence collection capabilities. To determine which security solution best fits your needs, you must ask yourself: what is your goal is?
Interested to Know More About Security Solutions?
Don’t hesitate to contact us with any questions you may have.
Facial Recognition Access Control
Touchless Biometric Authentication System
One of the major advantages of facial recognition access control is not having to wait at the point of entry. The software registers a person's face as they approach and can determine whether to allow access in the time needed to arrive at the gate. When the authorised person is near or at the access point, the system opens the gate. This prevents unauthorised individuals from slipping in through the open gate. Also, the person can proceed smoothly through the access point. Boon Edam's products support most third-party facial recognition systems to facilitate a touchless entrance.
Looking for Some Inspiration?
Our products have been developed and revitalised over the past 150 years. In that time, we have become accustomed to responding and adapting to the many changes within a political, environmental and national context. Still keeping in line with our original designs, our approach to the way in which we provide solutions has evolved from the classic revolving door to state-of-the-art entrance security. Our handful of picked projects within the portfolio reflects a varied range of entrance solutions to provide inspiration on the ways in which clients can tailor their solutions and how we can work together with you.
Need Advice?
Contact our Entry Experts, who are ready to support you.