Challenging as it may be, when installing a security system you must think of all the needs unique to you and your business, and attempt to find a system that touches each of these points. However, it helps to have a basic understanding and general knowledge of security to identify these needs.
You should always have a Risk Assessment should be conducted on your business and building by a professional security consultant before agreeing to a security system. After such an assessment, oftentimes your security consultant will recommend the implementation of layered security, as it is one of the most common and most valuable solutions. If/when they recommend this, it is important for you to understand what this means before signing on the dotted line.
Layered security is, quite simply, a design concept. Also known as “concentric circles of protection,” “compartmentalization” or “protection-in-depth,” layered security is one of the approaches included in Crime Prevention Through Environmental Design (CPTED). It presents a simple design concept comprised of three layers:
• Outer Protection Layer – e.g., natural or man-made barriers at property line
• Middle Protection Layer – e.g., exterior of building
• Inner Protection Layer – e.g., doors within building
These three layers of security strategies start from the outer perimeter and move inward to the area within the building or business requiring the greatest need for protection. Each layer is designed to delay an attacker as much as possible, and if properly planned, the delay should discourage a penetration or assist in controlling it by providing time for an adequate response by your security company or the local police.
However, remember– the layered security illustration is an example of applying a design concept, and you as a business owner should apply the concept appropriate for your facility. The example is also intentionally simple, whereas facilities are often more complex, having multiple buildings and multiple asset locations within each building.
In total, the protective measures in the layered security design are intended to provide one or more of these basic functions:
• Prevent (hazard condition or attempt by threat)- e.g., CCTV, Security
• Deter (access or attack by an active threat)-e.g. CCTV, Security, Access Control
• Detect (presence of hazard or threat)- e.g. CCTV, Security, Access Control
• Delay (access or attack action) e.g. Security, Access Control
• Assess (situation) e.g. Security, Access Control
• Respond (by denying access, defending or protecting assets)- e.g. Central Station Monitoring
The layered concept may not work for every business and their needs. Therefore, when determining which technology design fits your business best, try asking two questions for each security layer you have identified: What security functions should we implement, and what technology will support those functions? The answer to these questions will lead you to a security system tailor made for you and the needs of your business.
Happy designing!
Jason Beardsley, MBA, is the Branch General Manager with SDA Security. He can be reached at (800) 896-1144 or visit us at www.sdasecurity.com