Share, , Google Plus, Pinterest,

Print

Posted in:

How Do I Know Which Design System Will Secure My Business Best?

by Jason Beardsley

 

Challenging as it may be, it is important to think of all the needs unique to you and your business, and try to find a system that touches each of these points. To help identify these needs, a Risk Assessment of should be conducted on your business and building by a professional security consultant.

 

Understanding of today’s economy, most security consultants are looking to provide a security solution with your best interests in mind; upgrading or enhancing your current technology, rather than replacing, is always the best and first approach. And unless your existing technology is quite old and outdated, most systems can be enhanced easily. When designing your security system, the implementation of layered security is one of the most common and most valuable solutions security consultants present.

 

Layered security is, quite simply, a design concept. Also known as “concentric circles of protection,” “compartmentalization” or “protection-in-depth,” layered security is one of the approaches included in Crime Prevention Through Environmental Design (CPTED). It presents a simple design concept comprised of three layers:

• Outer Protection Layer – e.g., natural or man-made barriers at property line

• Middle Protection Layer – e.g., exterior of building

• Inner Protection Layer – e.g., doors within building

These three layers of security strategies start from the outer perimeter and move inward to the area within the building or business requiring the greatest need for protection. Each layer is designed to delay an attacker as much as possible, and if properly planned, the delay should discourage a penetration or assist in controlling it by providing time for an adequate response by your security company or the local police.

 

However, remember– the layered security illustration is an example of applying a design concept, and you as a business owner should apply the concept appropriate for your facility. The example is also intentionally simple, whereas facilities are often more complex, having multiple buildings and multiple asset locations within each building.

In total, the protective measures in the layered security design are intended to provide one or more of these basic functions:

• Prevent (hazard condition or attempt by threat)- e.g., CCTV, Security

• Deter (access or attack by an active threat)-e.g. CCTV, Security, Access Control

• Detect (presence of hazard or threat)- e.g. CCTV, Security, Access Control

• Delay (access or attack action) e.g. Security, Access Control

• Assess (situation) e.g. Security, Access Control

• Respond (by denying access, defending or protecting assets)- e.g. Central Station Monitoring

 

Lastly, when determining which technology design fits your business best, try asking two questions for each security layer you have identified: What security functions should we implement, and what technology will support those functions? The answer to these questions will lead you to a security system tailor made for you and the needs of your business.

Happy designing!