Intelligent buildings make intelligent security possible

Access & Identity Management Handbook 2006 Access Control & Identity Management

Comfort, safety and security in ­commercial buildings are not 'nice-to-haves'. They are essential to worker satisfaction and demanded for commercial buildings everywhere.

Architects, developers and building owners expect efficient, cost-effective solutions in new and existing buildings that provide flexible and integrated building information technology.

Building information management and control is expected to have lower cost installation and life cycle costs, self-contained information management systems and reduced risk.

Only when businesses understand the risks they face in terms of their building management and security systems will they be able to protect themselves against potential physical and personal damage or financial loss.

One precaution companies can take is to deploy electronic systems to help them manage their security requirements more effectively.

The office of the future is here

Systems are available that provide the scenario where an employee swipes an ID card to enter the building. Once the system knows he is at the entrance, the heat and electricity in his office are turned on and his computer is booted up. A window sensor will adjust climate control and ventilation when the window is opened during office hours, and then switch to an alarm system when the window is opened after hours.

A facilities manager monitors all building system activity and usage from a remote desktop PC, and is able to make adjusts on-the-spot, on-the-fly. The manager can be sitting in an office working, waiting for an electrician to call and announce that he has arrived at one of the company's buildings on the other side of town. He can watch him via a web cam connected to the Internet to verify that it is the right person and open the front door by a secret code entered from the computer.

Using a combination of biometrics, card reader and PIN code only employees authorised to access extremely sensitive areas are able to do so.

Building management

Buildings are controlled from one single user interface, accessed via the Internet. It can be taken a step further with the company not needing to install software on their site, where it stands the risk of being tampered with.

When investigating your security partner, ensure that the solutions they provide can help you to secure your facilities through such means as alarms on a need-to-know basis, dynamic event and alarm views, powerful event and alarm filters, anytime, anywhere access, using industry-standard technology and providing administration and reporting facilities.

They should be able to offer a broad range of security devices and systems, including, comprehensive access control, user and card management and optional video badging.

The ideal partner should be able to offer a complete, integrated building management solution that goes over and above managing all of the facility's environmental systems and gives the capabilities to keep your people safe and your buildings and assets secure.

If you take a single, integrated approach to building management and security, each system leverages from the other and gains power and functionality by being part of a total approach to building operations.

Importance of integration

It is important that the installation has a common presentation system for both building management and security functions. It should provide a single workstation environment for the design, configuration, management graphical user interface, and alarm handling for both HVAC and security solutions.

A common presentation system keeps operators focused, reduces training time and cost, and cuts overall cost of ownership. An alarm and event presentation system should bring together information from all different protocols and controllers attached to the system and present them in a single, consistent interface for user interaction.

A security solution should manage and present varied alarm and event data in a consistent way, permitting many different solutions to be managed by fewer operators, with less training. Without doubt, consistent alarm presentation improves response to events.

The user management system should be purpose-designed for typical security operators and be intuitive and easy-to-use, taking into account the differing levels of skill among operators, and allowing the operator presentation to be tailored to fit the needs of the specific user.

Only a limited amount of user intervention should be needed to establish devices on the network and configuration should be intuitive and simple. When you add a device to your device list, the rest of the set-up process should be primarily automated.

The right security solution should enable comprehensive access control and well designed functions that permit intruder detection monitoring to be established where needed. The open protocol and multiple secondary protocol connections should mean that interfaces to such systems as fire detection systems through Modbus are easy to achieve.

Bottom line - an improved ability to coordinate operations and optimise complete building performance including security. Further examples of the advantages include setting correct temperatures, lighting levels and security levels based on who enters or leaves areas or buildings based on integrated security detectors. In case of intrusion alarm, the system can use the BMS to turn on the lights in the relevant areas and take other action to heighten security and alert officials.

Window contacts can be used for multiple purposes - for security during off-hours and for zone control of heating, ventilation, cooling and lighting when the building is in use.

Security benefits

Having the intrusion alarm system integrated with individual zone control in every room enables building owners to track what has actually happened by utilising the alarm log on all PIR detectors, regardless of whether they belong to the security or the BMS system.

The communication system can run on the building's administrative TCP/IP network, so there is no need for separate communication bus cables and protocols. This simplifies daily operation and provides flexibility for future building changes and expansion. Workstations can be easily connected to any network socket, and Web interfaces can be set up on the users' PCs wherever there is a network connection.

Without doubt, intelligent buildings are the future, but companies investigating upgrading their security systems should not be put off by believing that they can only implement these systems in new buildings. Old buildings can also be made much more effective, with the right solution.

For more information contact Riaan Olivier, Schneider Electric South Africa, +27 (0) 11 254 6400, [email protected]



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...
ControliD's iDFace receives ICASA certification
Impro Technologies News & Events Access Control & Identity Management
The introduction of Control iD's iDFace facial biometric reader, backed by mandatory ICASA certification, underscores the commitment to quality, compliance, and innovation.

Read more...
The future of workplace access
HID Global Access Control & Identity Management
Mobile credentials are considerably more secure than physical access control, because they eliminate the need for physical cards or badges, support multiple security protocols, and add layers of protection on top of basic card encryption.

Read more...
Integrated, mobile access control
SA Technologies Entry Pro Technews Publishing Access Control & Identity Management
SMART Security Solutions spoke to SA Technologies to learn more about what is happening in the estate access world and what the company offers the residential estate market.

Read more...
Bespoke access for prime office space
Paxton Access Control & Identity Management Residential Estate (Industry)
Nicol Corner is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. It is also the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption.

Read more...
Next-generation facial recognition access control system
Enkulu Technologies Products & Solutions Access Control & Identity Management Residential Estate (Industry)
With a modern and innovative design, iDFace is the ideal device for monitoring and controlling people entering and exiting a building using facial recognition technology, including liveness detection, for enhanced security.

Read more...
Long-distance vehicle identification
STid Security Products & Solutions Access Control & Identity Management Residential Estate (Industry)
The STid SPECTRE reader can identify vehicles up to 14 metres away, across four traffic lanes, ensuring secure access to an estate without disrupting the traffic flow.

Read more...