How to implement your security policy the easy way.
If you’re a security manager, you’ll know how many different factors are involved when securing buildings and premises. You draw up a security policy to prescribe the appropriate security measures, but how do you then implement that policy?
How do you make sure security procedures happen as they should?
Choosing the right access control system helps make life easier.
In AEOS, our access control system, a range of automated features give alerts around specific security issues so you can ensure your policy is followed. It allows you to generate automatic responses, switch security levels, and track and respond to violations.
Let’s look at each of these aspects in turn.
You can use automatic responses to generate a specified response when a particular event or action occurs, or an expiry date has passed or is due to pass. They’re designed to raise an alarm in your access control system or notify key people when security is threatened.
Some examples are:
• If an invalid badge is presented (event), a video link is activated (response).
• If someone stays longer than they’re authorised to (event), they’re given a violation (response).
• If someone’s data is changed (action), a text is sent to them (response).
• If the expiry date of someone’s authorisations is imminent (expiry), an email is sent to a defined group of people (response).
Automatic responses are useful for dealing with minor breaches of your access control system, but you may need to take more drastic measures if there’s a serious incident.
In AEOS you can predefine scenarios that you can then activate in a matter of seconds. This means that, in an emergency, you can quickly switch to a different access mode and retain full control – determining exactly who can and can’t access your premises at that time.
You can, for example, predefine the authorisations that will apply if there’s a:
• Fire alarm.
• Open day.
• Visitor tour of the building.
When you need to, you can switch to the appropriate scenario and then restore your normal authorisation scenario as soon as you have the all clear.
Monitoring violations & blacklisting.
Having the ability to monitor violations of your security policy, and blacklist or sanction the offending people or vehicles, gives a great boost to safety and security.
This kind of feature can also be useful in managing general behaviour. If, for example, your company enforces a code of conduct as part of its security policy, you can record violations of the code in AEOS.
What other access control features do you find helpful in enforcing your security policy? What features are missing from your current system? I’d love to hear from you at email@example.com