4 FM quick reads on access control
1. Keep An Eye On Heat To Avoid Security Trouble
Overheated components too often are a factor in the premature failure of security equipment. In some cases, the mean time between failure decreases exponentially as the heat increases beyond the operating range of the equipment.
It is important for managers to ensure that equipment enclosures provide effective thermal management for the longevity of security equipment. The enclosure must be able to dissipate heat or prevent heat buildup beyond the equipment's maximum operating temperature. In very cold climates, managers might need to provide additional heat to keep the equipment from operating below the equipment's minimum operating temperature.
But since electronic equipment tends to reject heat inside an enclosure, overheating tends to be the greater problem. Too often, equipment is installed in an exterior enclosure with no thought to the heat load the equipment will generate inside the enclosure. The size or surface area of the enclosure plays a role in the amount of heat it can dissipate without using vents, fans, heat exchangers, or air conditioning.
The enclosure's location also might be a factor. If the enclosure is located in direct sunlight, it will have a significant increase in internal air temperature, and calculations to determine heat buildup become increasingly complex. The enclosure's color also takes on greater significance. For example, white enclosures will reflect much of the radiant heat from the sun.
Video cameras can feature a sunshield that stands off from the camera housing 1 inch or so and acts to absorb and dissipate heat before it reaches the housing.
Cooling systems can be classified as open or closed loop and active or passive systems. Open-loop systems use outside air to cool the components. They are often passive, using convection and heat dissipation. Closed-loop systems use internal air to cool the components. They are often active, using an external device or system to cool internal air.
Some systems on the market include louvers, grills, exhaust fans, heat exchangers, and air-conditioning systems. Some manufacturers provide special software that helps in selecting an appropriate cooling system for the enclosure.
2. Test New, Existing Systems To Ensure Working Access Control
When installing new access control hardware and software, testing it with existing doors and hardware is crucial to ensuring all systems are working properly.
While facility managers would not knowingly choose access control hardware and software that don't work well together, this can be the result if they don't take the time to review the systems, and test them together.
For example, consider what happens if the mechanical hardware on a door doesn't align with the electronic access control system. Once the door is mechanically locked, even a properly functioning access control system won't be able to open it.
Sometimes facility managers retain a key cylinder on a door with an electronic card reader. This allows an individual to bypass the card reading system with a key, thus destroying the audit system.
Of course, a facility still needs a backup system in case the card system fails. One way to handle this, yet not make it easy for individuals to bypass the system, is by installing new key cylinders when a new card system is implemented.
Then, the new keys should be given only to the individuals that truly need them. This provides redundancy, without potentially undermining the electronic access system.
Another mistake is failing to include all the components required to create a solid access control system. For instance, installing card access technology alone on a door creates an electronic locking system, but won't let you know if the door has been forced or propped open. That requires a door monitoring sensor.
Another area to watch is the interface between the access control system and the corporate network. Many access control systems rely on a company's network to transmit data. Some access control systems may not work effectively with the corporate network, or may strain network capacity, making data transmission more difficult.
3. Assess Future Needs When Putting In New Access Control
Facility managers charged with implementing a new access control system will want to do all they can to avoid mistakes.
Of course, that's true of any implementation. However, mistakes can be particularly troubling with access control systems because they're so visible. The implemented system needs to secure the building, yet still allow occupants to move about as needed.
When replacing an older system with an updated one, it becomes tempting to simply remove the current system and replace it with newer devices, retaining the same general configuration. While that might suffice, it also means foregoing the opportunity to re-assess a facility's security needs, as well missing out on the features that might not have been possible even a few years ago, says Harold Gillens, president of Quintech Security Consultants.
He provides an example: Some of today's systems can link a facility's security cameras to the floor plan. That can be valuable if, for instance, emergency responders need to track a dangerous individual as he or she moves within a facility.
Another mistake is overlooking the benefits of technology that works with both the existing components of a system and new technology as it emerges, says Frank Pisciotta, president of Business Protection Specialists. That is, a new system that can read both existing and new access cards eliminates the need to "re-badge" all employees. "It's not that much different in costs, but it provides tremendous flexibility" when migrating to the newer credentials, he says.
Remember that access cards are evolving, from bar code and magnetic stripe technology to smart cards and, in some cases, near-field communication. So a facility manager considering an upgrade will want to install a reader that works with new technology as it emerges, Pisciotta says.
4. Involve All Relevant Departments When Planning Access Control
As access control and security systems become more complicated and technical, it becomes increasingly important to ensure that all parties who can contribute to the selection are included, says Harold Gillens, president of Quintech Security Consultants.
Often, that means including representatives from human resources, as they usually are the ones in charge of bringing new employees into the system. The IT department also needs to be involved, so they can assess the interface between the access control and IT systems.
Outside expertise may also be needed to provide input to the design and installation of the access control system. Bringing in an expert typically does carry a cost. However, trying to get by without such input can backfire, as potential stumbling blocks often aren't caught until later in the process. At that point, any flaws become more expensive to correct. Not only that, the mistakes and their correction — say, prohibiting occupants from using a particular entrance because it's not properly secured — often become more visible than a facility manager or owner might want.
In some organizations, even marketing may have a role to play. For instance, the marketing department may want to manage the design of the key cards to ensure the company's brand is appropriately used.
These individuals may also be able to help obtain funding for the investment required, Gillens notes. "If you share the costs across emergency management, human resources, and IT, there may be more dollars available."
In addition, considering input from a range of individuals increases the likelihood that the final access control system more closely matches the corporate culture. This is key, as trying to impose a highly restrictive system on a freewheeling corporate culture may mean that the system isn't used.
Free E-mail Newsletters Sign-upWeekly Articles
Facility Webcast Alerts
Monthly Digital Magazine
Press Release Archives
Our Content On Your Site
FM Online Tools
- Content Directory
- Site Map
Other Online Resources