Page 12 - Security Today, March/April 2025
P. 12

P E R I M E T E R S E C U R I T Y
Iryna Liveoak/stock.adobe.com
Guiding Principles
By Andy Rudisill and Brian Davidson
perimeter security, especially amidst a steady
Construction sites represent a unique sector of
increase in commercial construction. As in any
security environment, assessing weaknesses and
threats remains paramount and modern technol-
ogy, coupled with sound access control principles, are critical in
addressing vulnerabilities at even the most secure construction
sites around the world.
The pillars of secure operational effi ciency, which are detailed
below, should serve as vital guideposts, not only at construction
sites and in physical applications outside a facility, but within a
building’s walls as well.
Despite commercial construction being a fundamental com-
ponent of our society for hundreds of years, the marriage be-
tween it and advanced access control is a young one. Only within
the past 10 to 12 years have companies started adopting more
modern technologies and drifted away from manually checking
in workers through a logbook.
The weaknesses in such an ecosystem are clear, including un-
authorized access to sensitive areas, valuable downtime spent
searching for people or assets, and the potential risk of equipment
theft. Too often, companies do not realize the need for advanced
security measures until it is too late, and an incident occurs.
Contractors need to have a comprehensive view of which
workers are on-site and modern software systems are allowing
them to monitor the workforce in real time. How that software
communicates with physical access solutions like identifi cation
badges, gates and turnstiles, is a critical integration that more
companies are starting to appreciate the value of.
1 2 At its core, it is a data-driven model that informs a variety
of actions. If a contractor sees there are 10 workers badged into
a drywall project and only three dedicated to wiring, they can
reallocate resources to staff appropriately. If a worker has not
badged in by a certain time, or if they are trying to access an area
they should not, a notifi cation is sent to a manager, which is par-
ticularly useful when overseeing many workers.
Should a threat arise, or a worker be terminated, an administra-
tor can deactivate that person’s credentials immediately, limiting
their access. A clear application for that would be in live construc-
tion areas, like educational or governmental campuses, where work
is being conducted on or next to fully operational buildings.
Equally as important as the operational monitoring benefi ts of
implementing comprehensive software solutions are the adminis-
trative benefi ts. There are a myriad of compliance regulations and
reporting requirements regarding construction and staff.
Having software in place that tracks staffi ng and access can be
a valuable supplement for managers who need to produce com-
pliance reports, sometimes at a moment’s notice. Additionally,
should an incident occur, managers can produce documentation
for any legal actions, both proactive and reactive, including re-
sponding to any injury claims.
It is an effi ciency tool that not only alleviates any inconvenience
in the short-term but can also save companies time and money in
the long-term by having clear auditing implemented from day one.
FROM THE OUTSIDE LOOKING IN
The signature of a hugely successful security system is in its level
of integration and communication. As noted, the concepts detailed
M A R C H / A P R I L 2 0 2 5 | S E C U R I T Y T O D A Y





































   10   11   12   13   14