Page 46 - Security Today, March 2022
P. 46

ALPR readers to scan vehicles to help identify an intruder’s threat level. For example, if a plate is on a police hotlist, security teams would know to alert the police and respond with greater caution.
Physical Identity and Access Management Systems (PIAMS) add another layer to the process by connecting access control to business systems, including human resource directories. This interconnectivity allows organizations to automatically assign or remove access to restricted areas based on corporate policies. As employees leave or change roles within an organization, their access to sensitive areas can be adjusted to reflect changes in the HR directory or other linked systems.
THE IMPORTANCE OF MANAGING ALL THAT DATA
As organizations deploy more sensors at the perimeter, they increase the amount of information coming in. This can become overwhelming for security staff, especially when they must actively monitor all the input from these sensors to identify specific threats.
A unified security system that supports greater automation can help. Automated alerts, alongside digitized standard operating procedures (SOPs) that guide staff step-by-step on how to respond to events, can help ensure that possible threats are identified, investigated and resolved in a timely and consistent
manner across different shift patterns and individuals.
In some cases, a potential security threat can be difficult for a person to spot. For example, an operator might not be able to connect the dots between a contractor unexpectedly entering a restricted area and a device going offline. But a unified security system could easily correlate those events and quickly flag them,
automatically alerting the operator to investigate further.
The ability to fuse event data is also important for ensuring perimeter security. Operators must understand events as they occur in order to make informed decisions based on threat levels. A unified security system provides greater situational awareness for operators by fusing together reports and alerts from all modules currently running on the platform. This is critical as it allows an emerging situation to be seen from all parts of the system as a single event rather than a series of separate incidents. When it comes to protecting the perimeter, you need to a layered approach that will allow you to extend security beyond
the fence line. By selecting a unified system that can incorporate a wide variety of new technologies, you can better secure your facilities today and in the future.
Cheryl Stewart is an industry and applications marketing analyst focusing on Airports at Genetec.
PROVEN MARKET LEADER INTRODUCES SPEEDLANE COMPACT.
VISIT US AT ISC WEST BOOTH #8037.
OUR SHORTEST OPTICAL TURNSTILE SOLUTION.
The Speedlane Compact delivers all you fundamentally need in an optical turnstile; while confidently delivering all that is required to make your visitors feel welcome and secure – every day. Whatever your space.
For more information, please visit:
www.boonedam.com/en-us/compact
46 MARCH 2022 | SECURITY TODAY Untitled-37 1 2/1/22 3:18 PM
PERIMETER SECURITY


































































































   44   45   46   47   48