A few years ago, a New Jersey teenager sneaked out of his home in the middle of the night and made himself famous overnight. He crawled through a hole in the perimeter fenceline, and made it past a sleeping security officer to go all the way up to the 104th floor of 1 World Trade Center. At the top of the building, he took selfies for two hours and posted them on social media. If that young man had been interested in stealing, committing arson, or breaching the company’s IT systems, the situation would have been disastrous. As might be expected, the security officer was fired, the contract security company was under review, and overall security of the building was scrutinized. Unfortunately, security breaches like this happen every day, although not always at such a high profile, and not always reported.
Boon Edam Blog
Can you sell a security solution? Of course, you can. You’ve been successfully doing it for many years and your company has been profitable, as well. You have benefited from the incredible growth that the physical security industry has experienced in the past few years that has supported thousands of integrators with new business and a recurring revenue model. Security end users are requesting innovative technologies in door hardware, access control systems, video surveillance and more to secure their facilities.
Organizations around the globe are looking for ways to reduce the risk of unauthorized entry due to tailgating and piggybacking. If not addressed appropriately, that risk can quickly turn into a liability, costing a company added time and expense, a bruised reputation and even the removal of members of the leadership team.
With almost all buildings in the public and private environment, the entrance is, rightly, expected to be accessible to everyone. Due to the increasing aging population, it is becoming more and more important to take the elderly and people with disabilities into account.
The world is full of choices, and a lot of the time it feels like, as a decision maker, you are left confused and trying to pick out the best in what feels like a sea of ‘the same’. When talking about a large and long-term investment such as an entry product, careful consideration should be taken to make sure you are selecting a professional partner for the right reasons. Not only the right reasons but also one who will remain in the picture for the life of the purchase.
In early January of 2018, the Security Industry Association (SIA) published, “Security Megatrends™: The 2018 Vision for the Security Industry.” This concise booklet summarized 10 megatrends, one of which was #4, “Evolution of Risk Management: Risk Management Transcends Department Titles”, which asserted the following:
The problem with some employees is that they are too nice. They let people in behind them without thinking about it. Most of us are not raised to close a door in someone’s face, so we hold a door open for them, or we let them in behind us, especially if they have forgotten their credentials at home. Good manners, right? Yes, but not good security.
Even though they’ve been around for decades, sales of security doors and turnstiles have increased markedly in the last several years. Some of the biggest companies on the planet are implementing them globally and tying them into their access control systems. Why now? What has changed?
Every organization faces a wide range of risks on a daily basis. Of all these various risks, there are five specific categories affected by access control, where the risks increase significantly when an unauthorized person has gained access into a controlled area. To manage any of these risks, you have a choice: you can choose to respond after the infiltration occurs or prevent infiltration from happening up front.
We’ve installed thousands of entry solutions, talked to end users all over the world and have developed a comprehensive process for choosing the right security entrance. That said, no process is perfect, and we’ve come to observe that certain organizations will consider some of the decision criteria quite well but leave out one or two factors. We call these the “gotchas,” and when forgetting or ignoring any one of the criteria, you can end up with a security entrance that doesn’t address the needs of your organization.