You’ve probably already done a ton of preparation to harden your organization against breaches. This could include creating firewalls on your network, applying network patches, establishing an information security policy, training your employees not to open phishing emails, implementing strong access control measures, setting up a strong password system, and more. Overall, you are feeling pretty good about your company’s cybersecurity strategies and overall cyber health. With all the work you’ve done, what could you still be missing?
Boon Edam Blog
Your sales margin is an important indicator of the success of your business. The higher your sales margin, the more profit potential you'll have. Striving for strong sales margins, while keeping a close watch on your competition, is critical for critical for long-term business success.
Yet, that’s not an easy task in the security industry, given today’s competitive environment where manufacturers are too often locked in a race to the bottom with respect to pricing.
A few years ago, a New Jersey teenager sneaked out of his home in the middle of the night and made himself famous overnight. He crawled through a hole in the perimeter fenceline, and made it past a sleeping security officer to go all the way up to the 104th floor of 1 World Trade Center. At the top of the building, he took selfies for two hours and posted them on social media. If that young man had been interested in stealing, committing arson, or breaching the company’s IT systems, the situation would have been disastrous. As might be expected, the security officer was fired, the contract security company was under review, and overall security of the building was scrutinized. Unfortunately, security breaches like this happen every day, although not always at such a high profile, and not always reported.
Can you sell a security solution? Of course, you can. You’ve been successfully doing it for many years and your company has been profitable, as well. You have benefited from the incredible growth that the physical security industry has experienced in the past few years that has supported thousands of integrators with new business and a recurring revenue model. Security end users are requesting innovative technologies in door hardware, access control systems, video surveillance and more to secure their facilities.
The problem with some employees is that they are too nice. They let people in behind them without thinking about it. Most of us are not raised to close a door in someone’s face, so we hold a door open for them, or we let them in behind us, especially if they have forgotten their credentials at home. Good manners, right? Yes, but not good security.
Even though they’ve been around for decades, sales of security doors and turnstiles have increased markedly in the last several years. Some of the biggest companies on the planet are implementing them globally and tying them into their access control systems. Why now? What has changed?
Every organization faces a wide range of risks on a daily basis. Of all these various risks, there are five specific categories affected by access control, where the risks increase significantly when an unauthorized person has gained access into a controlled area. To manage any of these risks, you have a choice: you can choose to respond after the infiltration occurs or prevent infiltration from happening up front.
We’ve installed thousands of entry solutions, talked to end users all over the world and have developed a comprehensive process for choosing the right security entrance. That said, no process is perfect, and we’ve come to observe that certain organizations will consider some of the decision criteria quite well but leave out one or two factors. We call these the “gotchas,” and when forgetting or ignoring any one of the criteria, you can end up with a security entrance that doesn’t address the needs of your organization.
Security systems have long been in the business of risk mitigation. In addition to controlling potentially perilous situations as they occur and dealing with them safely and efficiently, a security system and its operators need to be able to identify problem areas and use the systems at their disposal to prevent issues, when possible, before they even occur.
A major source of risk for any facility—large or small, new or established—are the entrances and exits. Every facility has at least one entrance and an access control system alone cannot effectively mitigate the risk of unauthorized entry. Many buildings will have a number of different areas in their floorplan that require varying levels of security at the entrances to that area, even if it’s as simple as locking an office before the weekend.
We recently met with a Fortune 100 company who had constructed their own mantrap style security vestibule at the entrance to a data center. They figured it would save them money, but it ended up being ineffective and a constant drain on resources.
When a campus recreation center experiences large numbers of people entering at once, reception staff can become overwhelmed as they work to manage the entrance and handle other administrative tasks. This creates the risk of unauthorized entry into the facility by non-members and “friends of friends.” Today, rec centers around the country are deploying security turnstiles, integrated with membership management systems, to provide reliable entrance security as well as data collection. Let’s explore some of the benefits of this new model...