+ All Categories
Home > Documents > Perimeter Access Control The Key To: 1. Total Physical Risk Reduction 2. Optimizing Security While...

Perimeter Access Control The Key To: 1. Total Physical Risk Reduction 2. Optimizing Security While...

Date post: 26-Mar-2015
Category:
Upload: owen-templeton
View: 216 times
Download: 0 times
Share this document with a friend
Popular Tags:
9
Perimeter Perimeter Access Access Control Control The Key The Key To: To: 1. Total 1. Total Physical Physical Risk Risk Reduction Reduction 2. Optimizing 2. Optimizing Security Security While While Maximizing Maximizing Throughput Throughput 3. Adding 3. Adding Operational Operational Value Value
Transcript
Page 1: Perimeter Access Control The Key To: 1. Total Physical Risk Reduction 2. Optimizing Security While Maximizing Throughput 3. Adding Operational Value.

Perimeter Perimeter Access Access Control Control

The Key To:The Key To:

1. Total Physical 1. Total Physical Risk ReductionRisk Reduction2. Optimizing Security 2. Optimizing Security WhileWhile Maximizing Maximizing Throughput Throughput 3. Adding Operational 3. Adding Operational ValueValue

Page 2: Perimeter Access Control The Key To: 1. Total Physical Risk Reduction 2. Optimizing Security While Maximizing Throughput 3. Adding Operational Value.

Automatic Vehicle Automatic Vehicle IdentificationIdentification

FeaturiFeaturingng

Page 3: Perimeter Access Control The Key To: 1. Total Physical Risk Reduction 2. Optimizing Security While Maximizing Throughput 3. Adding Operational Value.

No longer is it acceptable to begin No longer is it acceptable to begin security at the walls of your building. security at the walls of your building. Allowing free roaming access to anyone Allowing free roaming access to anyone approaching your building or property approaching your building or property is not only risky, it’s dangerous.is not only risky, it’s dangerous.

The Need for Perimeter The Need for Perimeter Security and ControlSecurity and Control

Page 4: Perimeter Access Control The Key To: 1. Total Physical Risk Reduction 2. Optimizing Security While Maximizing Throughput 3. Adding Operational Value.

Entities that have recognized this need Entities that have recognized this need have implemented barriers and have implemented barriers and impediments to keep unauthorized impediments to keep unauthorized individuals out.individuals out.

The Need for Perimeter The Need for Perimeter Security and ControlSecurity and Control

Page 5: Perimeter Access Control The Key To: 1. Total Physical Risk Reduction 2. Optimizing Security While Maximizing Throughput 3. Adding Operational Value.

The Need for Perimeter The Need for Perimeter Security and ControlSecurity and Control

But a secure perimeter means nothing But a secure perimeter means nothing without access for the right people at the without access for the right people at the right time---and that means gate and right time---and that means gate and Identification Technology.Identification Technology.

ID Tech can take multiple forms from card ID Tech can take multiple forms from card readers and key pads….readers and key pads…. to live guards stationed at the entrance.to live guards stationed at the entrance.

Page 6: Perimeter Access Control The Key To: 1. Total Physical Risk Reduction 2. Optimizing Security While Maximizing Throughput 3. Adding Operational Value.

But live guards, while But live guards, while effective are costly.effective are costly.

And card readers and key And card readers and key pads create “Choke Points” pads create “Choke Points” that compromise security---that compromise security---

andand reduce efficiency. reduce efficiency.

Page 7: Perimeter Access Control The Key To: 1. Total Physical Risk Reduction 2. Optimizing Security While Maximizing Throughput 3. Adding Operational Value.

But with long range But with long range Automatic Vehicle Automatic Vehicle Identification from Identification from Nedap AVI you never Nedap AVI you never have to stop and wait have to stop and wait for the gate.for the gate.

Page 8: Perimeter Access Control The Key To: 1. Total Physical Risk Reduction 2. Optimizing Security While Maximizing Throughput 3. Adding Operational Value.

Eliminating choke Eliminating choke points, accelerating points, accelerating throughput and throughput and heightening both heightening both security and efficiencysecurity and efficiency

Page 9: Perimeter Access Control The Key To: 1. Total Physical Risk Reduction 2. Optimizing Security While Maximizing Throughput 3. Adding Operational Value.

……guarding against guarding against vehicles becoming vehicles becoming a a Trojan HorseTrojan Horse..

So a stolen vehicle So a stolen vehicle can‘t be used for can‘t be used for access.access.

And Nedap AVI’s unique And Nedap AVI’s unique Dual ID capability, that Dual ID capability, that can identify both the can identify both the driver and the vehicle… driver and the vehicle…


Recommended