Page 44 - Security Today, July 2017
P. 44
COVER STORY
CPTED offers a number of strategies, several of which directly enhance perimeter security:
• Provide clear border definition of controlled space;
• Provide clearly marked transitional zones that indicate movement
from semi-public to private space;
• Re-designate the use of space to provide natural barriers to conflict-
ing activities;
• Redesign space to increase the perception or reality of natural
surveillance.
There is a good deal of CPTED guidance and information online. We encourage security professionals and school administrators alike to review the information and become familiar with the many simple-to- deploy, common sense strategies for improved security.
TIPS FOR INITIATING A CAMPUS SECURITY PROJECT
When beginning the process of evaluating and upgrading a security plan, start by answering the following: Which departments will be affected? Which departments have a budget for this type of project? And be sure to involve those decision makers from the start.
Walk around the campus and do a quality check on your own before engaging an outsider. Pay special attention to older facilities; they often include additional complexity, especially when adding electronic secu- rity to existing doors. Note the condition of hinges, doors, and locks, which can wear out after many years of use by thousands of students.
It’s important to always take the time to speak with local security professionals. Many industry events provide opportunities to share best practices and lessons learned with other schools, which offers the opportunity to ask for references. Whether it’s a security consultant or systems integrator, an adept security professional’s experience and knowledge can be invaluable. Find someone in the industry who attends the annual security shows, collaborates with other profession- als and manufacturers to keep up with industry trends, while staying current with codes and standards.
Basic cost estimates are easy to get from providers, but there’s so much more that goes into large-scale security projects. A certain amount of due diligence is required since there is no one-size-fits-all. Every security system is uniquely tailored to each situation. And it requires more legwork than most end users expect.
APPLY A CURB-TO-CORE APPROACH
The best way to approach perimeter and security design is to consider solutions starting from the street and working your way into the facility, all the way down to securing the pharmaceuticals in the nurse’s office.
As part of a perimeter security plan, a trend that’s happening more and more in K-12 schools is the creation of entry vestibule—a single, controlled access point that prevents a visitor from moving past that point without authorization.
This creates a control point where a visitor comes into the vestibule, speaks with someone at the front desk who greets and identifies the visitor, and then is either allowed or denied access into the controlled area, which is usually the main hallway of the campus.
Perimeter security isn’t always just about violent intruders. Good perimeter security greatly reduces opportunities for vandalism and theft during school hours as well as after. Schools today are full of valu- able equipment, including computers, laptops, tablets, lab supplies and equipment, projectors, sound systems and more.
PLAN AND PREPARE
Don’t just depend on the physical security hardware alone to ensure
occupant safety. Schools need trained people in place who know the procedures that can circumvent incidences from occurring or guide everyone to safety in an emergency.
An ongoing analysis of the habits of people flowing through the facility should be performed by administrators and security profes- sionals to ensure the plan remains relevant and effective. Seek out potential gaps in your plan and look for any holes. Work with local law enforcement professionals—their knowledge and advice are essential. Always consult with your team of service providers that may include security consultants, systems integrators, IT professionals, manufac- turers and other experts.
Having a successful perimeter and security strategy in place means making sure that the physical aspects of a security system – locks, exit devices, electronic access control systems and other hardware – are in place. And just as importantly, it means that security personnel, stu- dents, and administrators are as prepared and trained as possible. Within the concentric layers of a security plan, the total plan is only as strong as the weakest layer. Plan accordingly.
Ben Williams is the Senior Product Manager for HES, an ASSA ABLOY group brand, located
in Phoenix, Arizona. David
Corbin has been in the access
control industry since 2013 and is currently the Senior Product Manager for Secu- ritron, an ASSA ABLOY group brand.
CS10 WWW.CAMPUSLIFESECURITY.COM | JULY 2017
A SPECIAL SECTION TO SECURITY TODAY AND THE JOURNAL
CAMPUS SECURITY & LIFE SAFETY
Papuchalka - kaelaimages/Shutterstock.com