The new dynamics of security and safety mandates for security entrances

INDUSTRY PROFESSIONAL

Navigating the Retrofit

The new dynamics of security and safety mandates for security entrances

Most security managers know that security technology has come a long way in the last few years, and equipment and systems purchased five or 10 years ago will need to be updated or replaced. When the update plan includes security entrances, like turnstiles and revolving doors, the project may bring unique challenges and pitfalls. With careful planning and foreknowledge, pitfalls can be avoided. New security entrances can be integrated without compromising security or safety.

The Role of Turnstiles in Physical Security
The past year has highlighted the importance of security in general, and brought to the forefront the role that security entrances can mitigate the costly liabilities associated with unauthorized entry, but also assisting in the safety and wellbeing of staff during a pandemic. Understanding their responsibility for “duty of care” to those occupying their spaces, building owners and security professionals must account for the changing social landscape and the growing options of available entrance technologies for controlling access.

Retrofit First Step Includes Determining Security Goals
When building owners are looking to upgrade the physical security of their facilities through the use of security entrances, the first step should be to clearly define the organization’s security goals, gaining a solid understanding of the threat and culture of the facility. With this information in hand, it will be possible to choose the right revolving door or turnstile solution that will not only meet an organization’s needs, but also be a good fit with the corporate culture.

The obvious challenge of a security retrofit project is that the new technology is often replacing a solution that already exists. It’s also possible that existing technologies, in many instances, are still a part of the retrofit plan. To aid in the process, security professionals should develop a strategic retrofit roadmap ahead of time. This map will outline how to keep existing systems and devices functioning while the retrofit is in progress. When this map is communicated to others in the organization, there is a sense of transparency towards staff, employees and other stakeholders.

The Biggest Challenge is on the Floor
As security dynamics shift with changing technology, most systems integrators will tell you the goal is to design entrances that are on the cutting edge of security but balanced with the need to welcome people and move them through quickly. Many security entrance projects are retrofits to existing buildings and the biggest challenge usually revolves around the flooring in the facility.

The floor must be dead level for a security entrance to work properly. In the case of a security revolving door, a door rotating on an uneven floor will put undue stress on the door wings and the door operator. The wear and tear will be excessive and the door will have to be replaced sooner than expected. Shimming is a popular method for trying to square a door on an unleveled floor. However, the shims will eventually force the door out of balance and plum, resulting in a door that is hard to push, is excessively loud when operating and will eventually fail prematurely.

For lobby turnstiles, all conduits and wiring for electrical, access control and fire connections should be run through the floor. Existing flooring configurations, especially when the floor is made of concrete with existing conduit inside, often require breaking and removing the floor to install the new wiring and conduit in the appropriate locations. This adds considerable expense to the project and may also be technically prohibitive depending on the building. One potential solution of existing wiring in concrete flooring is to add special, above-grade platforms that are mounted to the floor surface under the turnstiles.

Power, access control, fire alarm connections and proper flooring/conduit requirements must be properly addressed to ensure a smooth and cost-effective installation. These items should be in place and functional before the installation begins.

Additional Retrofit Considerations
Safety is rarely discussed during the bidding process in a retrofit project. However, it is the one factor that could quickly and possibly tragically undermine the success of the project. Most security entrances use a barrier of some kind. The more sophisticated barriers use presence sensors to detect objects or users. Building owners looking to upgrade security entrances should carefully consider how proposed solutions will prevent entrapment or contact, and how they should respond to either event.

These decisions should then be based on the facility’s security versus safety needs, the ability and ease of product training for staff, the product’s response to an incident during peak periods (does it stop and require re-badging?) and whether large objects are typically carried or pulled behind.

Another consideration relates to the upgrade of older security entrance technologies to larger-sized products, especially when space is limited in an older building. Larger products can lead to having fewer products – be sure to check your traffic and throughput needs before you reduce the number of entrances.

Include service considerations when making a buying decision. During and after installation of a security entrance, the level of service directly impacts continued operations and ROI. Consider the negative impact of a delayed installation or service visit, or delayed parts availability on your building entrance procedures – all because service was left out of the decision-making process.

A final and key consideration on your next retrofit project is considering the culture of the organization the new or upgraded technology will serve. Culture permeates all other decision factors and is critical to success. Successful security policy is a direct result of top-to-bottom commitment to both technology and business operations. All management stakeholders involved in the buying decision, from CEO to employees, should be an intimate part of the retrofit process and be willing to assist in implementing a culture shift through communication and training.

This article originally appeared in the May June 2021 issue of Security Today.

Featured

  • Maximizing Your Security Budget This Year

    7 Ways You Can Secure a High-Traffic Commercial Security Gate  

    Your commercial security gate is one of your most powerful tools to keep thieves off your property. Without a security gate, your commercial perimeter security plan is all for nothing. Read Now

  • Surveillance Cameras Provide Peace of Mind for New Florida Homeowners

    Managing a large estate is never easy. Tack on 2 acres of property and keeping track of the comings and goings of family and visitors becomes nearly impossible. Needless to say, the new owner of a $10 million spec home in Florida was eager for a simple way to monitor and manage his 15,000-square-foot residence, 2,800-square-foot clubhouse and expansive outdoor areas. Read Now

  • Survey: 72% of CISOs Are Concerned Generative AI Solutions Could Result In Security Breach

    Metomic recently released its “2024 CISO Survey: Insights from the Security Leaders Keeping Critical Business Data Safe.” Metomic surveyed more than 400 Chief Information Security Officers (CISOs) from the U.S. and UK to gain deeper insights on the state of data security. The report includes survey findings on various cybersecurity issues, including security leaders’ top priorities and challenges, SaaS app usage across their organization, and biggest concerns with implementing generative AI solutions. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

Featured Cybersecurity

Webinars

New Products

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.” 3

  • Unified VMS

    AxxonSoft introduces version 2.0 of the Axxon One VMS. The new release features integrations with various physical security systems, making Axxon One a unified VMS. Other enhancements include new AI video analytics and intelligent search functions, hardened cybersecurity, usability and performance improvements, and expanded cloud capabilities 3

  • Hanwha QNO-7012R

    Hanwha QNO-7012R

    The Q Series cameras are equipped with an Open Platform chipset for easy and seamless integration with third-party systems and solutions, and analog video output (CVBS) support for easy camera positioning during installation. A suite of on-board intelligent video analytics covers tampering, directional/virtual line detection, defocus detection, enter/exit, and motion detection. 3