Boon Edam Blog

Shifting Your Physical Security Approach from Forensics to Preventive Starting at the Front Door

You’ve just held open the front door of your office building to a well-dressed person who was fumbling for their access card. You’re feeling pleased about the good deed that you just did. Except – in reality, you just let in a hacker who will soon bypass your company’s network security and gain easy access to your organization’s most valuable electronic assets.

Read more

5 BIM (Building Information Modeling) Trends to Watch in 2018

BIM, or Building Information Modeling, has been growing in popularity within the building construction and architectural sectors. It is regarded as the superior alternative to 3D CAD modeling. Working in the BIM environment provide building project teams to collaborate in one, single place – all working with the same facts, data and visuals from the entire lifecycle of a building. This then will serve as the blueprint for everyone involved, in whatever capacity, to bring the project to life from conception to maintenance.

Read more

5 Ways to Create an Accurate Revolving Door Specification that Estimators Will Love

Creating a revolving door specification (“spec” for short) can be extremely challenging. Many architects and specifiers today utilize online specification services for identifying the revolving doors they want to incorporate into their projects. These online sites often provide “master” revolving door specs that bundle numerous different types of doors into a single 20+ page document. The architect or specifier has to know what to keep and what to delete. This process creates the potential for errors.

Read more

How Do Security Entrances Measure Up Against Compliance Regulations?

Security professionals build their security plans around compliance to a number of industry-specific regulations. Whether an organization is required to adhere to the standards of PCI, NERC, HIPAA, or FSMA, the concerns are the same. How does a company balance the added costs necessary to comply with the regulations, with the high fines and lost time that comes with not complying? Security compliance isn’t a cut and dry topic. Regulations, as written, are to interpretation; when it comes to security entrances, it’s all in the “eye of the beholder.” A security manager may think he has the necessary precautions in place, but after a breach has occurred, would a court of law agree that the company did everything possible to prevent it? In several cases, the answer has been “no” and hefty fines were imposed.

Read more

Functional Airport Solutions at Every Zone

Airports have undoubtedly become high-risk environments that are routinely regulated by national and international legislation. Over time, the threat to global travel has increased, meaning that the likelihood of violations regarding international travel has become highly likely. Therefore, the need to build a flexible solution weighs heavily on those whose role it is to assess and evaluate the internal safety of an airport while still continuously addressing the needs of passengers, airport visitors and employees alike.

Read more

6 Service Features to Consider Before You Purchase Security Entrances

Not long ago, a Philadelphia office tower installed two optical turnstiles in their main lobby that matched the building’s aesthetics beautifully. After a few years, however, one of the turnstiles stopped working and a part had to be ordered from Europe—with downtime estimated at four weeks. With only two optical turnstiles in their lobby, having one out of service was unacceptable. The owner immediately began looking into replacing the turnstiles.

Read more

Cyber Risk Management Planning: Are You Missing Something?

You’ve probably already done a ton of preparation to harden your organization against breaches. This could include creating firewalls on your network, applying network patches, establishing an information security policy, training your employees not to open phishing emails, implementing strong access control measures, setting up a strong password system, and more. Overall, you are feeling pretty good about your company’s cybersecurity strategies and overall cyber health. With all the work you’ve done, what could you still be missing?

Read more

Integrating High Security Solutions into Data Centers

Data centers are highly sensitive areas when it comes to protecting sensitive data. The need to build and secure a ‘gold standard’ facility is top-of-mind for those tasked with the responsibility.Once a thorough and professional risk assessment has been done on the data and equipment, the results will give a good foundation to determine to what extent the facility will need to be physically secured.

Read more

Aesthetics: When Looks and Beauty Matter for Security Entrances

Google the term “best looking offices” and you’ll find no shortage of results, with photos of interiors featuring beautiful design, materials, light and color. But do office space aesthetics actually have an effect on companies and their people? And how do aesthetics fit into the equation when it comes to how secure an office space is?

Read more

How Guards and Security Entrances Work Together for Risk Mitigation

Maintaining a secure entrance is an essential part of overall building security, and many enterprises are employing security officers to guard their entrances and exits, and to manage traffic flow. Hiring a security professional who is trained to secure an enterprise while being welcoming and helpful to tenants and guests can deter crime and provide peace of mind. In addition, security officers are your critical first responders, should something go wrong.

Read more

Contact us