Perimeter Access Control The Key To: 1. Total Physical Risk Reduction 2. Optimizing Security While...

Post on 26-Mar-2015

216 views 0 download

Tags:

transcript

Perimeter Perimeter Access Access Control Control

The Key To:The Key To:

1. Total Physical 1. Total Physical Risk ReductionRisk Reduction2. Optimizing Security 2. Optimizing Security WhileWhile Maximizing Maximizing Throughput Throughput 3. Adding Operational 3. Adding Operational ValueValue

Automatic Vehicle Automatic Vehicle IdentificationIdentification

FeaturiFeaturingng

No longer is it acceptable to begin No longer is it acceptable to begin security at the walls of your building. security at the walls of your building. Allowing free roaming access to anyone Allowing free roaming access to anyone approaching your building or property approaching your building or property is not only risky, it’s dangerous.is not only risky, it’s dangerous.

The Need for Perimeter The Need for Perimeter Security and ControlSecurity and Control

Entities that have recognized this need Entities that have recognized this need have implemented barriers and have implemented barriers and impediments to keep unauthorized impediments to keep unauthorized individuals out.individuals out.

The Need for Perimeter The Need for Perimeter Security and ControlSecurity and Control

The Need for Perimeter The Need for Perimeter Security and ControlSecurity and Control

But a secure perimeter means nothing But a secure perimeter means nothing without access for the right people at the without access for the right people at the right time---and that means gate and right time---and that means gate and Identification Technology.Identification Technology.

ID Tech can take multiple forms from card ID Tech can take multiple forms from card readers and key pads….readers and key pads…. to live guards stationed at the entrance.to live guards stationed at the entrance.

But live guards, while But live guards, while effective are costly.effective are costly.

And card readers and key And card readers and key pads create “Choke Points” pads create “Choke Points” that compromise security---that compromise security---

andand reduce efficiency. reduce efficiency.

But with long range But with long range Automatic Vehicle Automatic Vehicle Identification from Identification from Nedap AVI you never Nedap AVI you never have to stop and wait have to stop and wait for the gate.for the gate.

Eliminating choke Eliminating choke points, accelerating points, accelerating throughput and throughput and heightening both heightening both security and efficiencysecurity and efficiency

……guarding against guarding against vehicles becoming vehicles becoming a a Trojan HorseTrojan Horse..

So a stolen vehicle So a stolen vehicle can‘t be used for can‘t be used for access.access.

And Nedap AVI’s unique And Nedap AVI’s unique Dual ID capability, that Dual ID capability, that can identify both the can identify both the driver and the vehicle… driver and the vehicle…