Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software &...

46
Physical Security Integration & Access Control --- Part 2: Software & Best Practices

Transcript of Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software &...

Page 1: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Physical Security Integration & Access Control

---Part 2: Software & Best Practices

Page 2: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Keith HarrisMarketing ManagerLENSEC

Today’s Panelist

Expertise in Photography & Video Production

Experience in Physical Security Market

Trainer for Surveillance & Physical Security Techniques

Page 3: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Webinar Sponsor

Based in Houston, TX

Since 1998

IP Video Management

System Design

Installation

Project Management

LENSEC is committed to empowering our clients and partners to prevent or mitigate physical security risks. We want to help protect people and assets as well as improve operations through our evolutionary and intuitive technology. We can do this by providing expertise in security and software development.

Our Mission

Page 4: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Webinar Logistics

Q&A at the end

Questions for the panelist

Audio from attendees muted

Poll questions

Survey

LENSEC Step Into Security Webinar Archive: http://bit.ly/SISarchive

Page 5: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Training Goal

Physical Security Integration & Access ControlPart 2: Software & Best Practices

Topics for Webinar:

Access Control Management SoftwareUnifying Physical Security PlatformsBest PracticesReviewing Components

LENSEC Step Into Security Webinar Archive: http://bit.ly/SISarchive

Page 6: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

ElementsLive View Interface

Current StatusDoor Management

Device ConfigurationRules/Schedules

Cardholder ManagementReporting

Access Control Management SoftwarePhysical Security Integration & Access Control

Page 7: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Live View InterfaceDoor EventAlarm EventLock/Unlock Controls

Access Control Management SoftwarePhysical Security Integration & Access Control

Page 8: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Poll Question

Poll Question #1

Access control rules apply to…

Page 9: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Door ManagementDevice ConfigurationRules/Schedules

Access Control Management SoftwarePhysical Security Integration & Access Control

Page 10: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

SchedulingAfter Hours AccessWeekend AccessHoliday Schedules

Access Control Management SoftwarePhysical Security Integration & Access Control

Page 11: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Cardholder ManagementGroups/RolesPrivileges/PermissionsUsers/Credentials

Access Control Management SoftwarePhysical Security Integration & Access Control

Page 12: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

ReportingAccess Control Management Software

Physical Security Integration & Access Control

Page 13: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Access Control LevelsFlat Configuration

Operational Vulnerabilities

Access Control Best PracticesPhysical Security Integration & Access Control

Page 14: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Access Control LevelsAdvanced Configuration

System SegregationAccountabilityEscortability

Physical Security Integration & Access ControlAccess Control Best Practices

Page 15: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Physical Security Integration & Access Control

Page 16: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Physical Security Integration & Access Control

Page 17: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Multi-site Management

Enterprise Access Control Systems Physical Security Integration & Access Control

Page 18: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Enterprise FeaturesThird Party Integration

PayrollVisitor ManagementAccounting SystemsSQL Database

Single Sign OnActive Directory/LDAP

Enterprise Access Control Systems Physical Security Integration & Access Control

Page 19: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Integrating Physical Security PlatformsSecurity FootprintBuilding Safety Systems

Unifying Physical Security PlatformsPhysical Security Integration & Access Control

Page 20: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Video VerificationAccess Control Management

Physical Security Integration & Access Control

Page 21: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Visitor ManagementTime & Attendance

Integrating Physical Security SystemsPhysical Security Integration & Access Control

Page 22: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Poll Question

Poll Question #2

What is mustering?

Page 23: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

MusteringAnti-PassbackAccess Control MethodsPreventing Door ProppingManagement & Policies

Access Control Best PracticesPhysical Security Integration & Access Control

Page 24: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

MusteringDid Everyone Make It Out?Area TrackingChecking In

Access Control Best PracticesPhysical Security Integration & Access Control

Page 25: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Anti-Passback ControlsTime LimitReader Pattern & Flow

Access Control Best PracticesPhysical Security Integration & Access Control

Page 26: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Tailgating/Piggybacking DetectorsHold Open AlarmsTurnstiles & Revolving DoorsMantraps/AirlocksIP Camera Video Analytics

Special Use Access ControlElevatorsSallyports

Access Control Best PracticesPhysical Security Integration & Access Control

Page 27: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Door ProppingConvenience vs. Security

Access Control Best PracticesPhysical Security Integration & Access Control

Page 28: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Human Resources Employment Status Change

SecurityReport OutCollecting Credentials

Access Control Best PracticesPhysical Security Integration & Access Control

Page 29: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Card Holder Database Operational ResponseDatabase PerformanceReuse of Credentials

Access Control Management – Best PracticesPhysical Security Integration & Access Control

Page 30: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Rules & StandardsFail Safe/Fail SecureChoosing LocksExit DevicesCredentialsCard ReadersDoor ControllersAuthorization Interface

Access Control Review – Components & ConceptsPhysical Security Integration & Access Control

Step Into Security Webinar – Physical Security Integration & Access Control – Part One: Concepts & Components - http://bit.ly/SIS5-16

Page 31: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Building & Fire CodesNFPA – National Fire Protection AssociationAHJ

Rules & Standards ReviewPhysical Security Integration & Access Control

National Fire Protection Assoc. Codes & Standards: http://www.nfpa.org/codes-and-standards/document-information-pagesInternational Building Code: http://www.iccsafe.org/codes-tech-support/codes/2015-i-codes/ibc/

Page 32: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Poll Question

Poll Question #3

True or False: Most doors default to Fail Safe if you don’t have direction from the specifications or AHJ.

Page 33: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Access Control Concepts ReviewPhysical Security Integration & Access Control

Fail Safe – Locks are ReleasedFail Secure – Locks are SecuredApplies to Entry Control OnlyManual Egress Allowed

Page 34: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Choosing LocksAccess Control Components Review

Physical Security Integration & Access Control

CylindricalLock Mortise

LockSurface Lock

Deadbolt Lock Deadlatch Lock

Maglock

Door Strike

Electronic Lockset

Page 35: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Exit DevicesRequest To ExitCrash BarPIR-RTEPush Button

Access Control Components ReviewPhysical Security Integration & Access Control

Crash Bar

PRI-RTE Push Button RTE

Page 36: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

CredentialsCard ReaderDoor ControllerAccess Control Server

Access Control Components ReviewPhysical Security Integration & Access Control

Keyfob Badge Clamshell

Page 37: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Authorization FactorsMultifactor CredentialsPossession: Something You HaveKnowledge: Something You KnowCharacteristic: Something You AreTrusted Verification: Someone Trusted Verifies You

Access Control Concepts ReviewPhysical Security Integration & Access Control

Page 38: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Authorization InterfaceKeypadBiometrics

Retinal/Iris ScanFingerprint

Access Control Components ReviewPhysical Security Integration & Access Control

Page 39: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Fingerprint TheftLiveness Detection SolutionsTissue ReflectionHeartbeat DetectionDermal Electric ResistanceUnnatural Analysis

The Future of Access Control TechnologyPhysical Security Integration & Access Control

Page 40: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Near Field Communication (NFC) Bluetooth Low Energy (BLE)

The Future of Access Control TechnologyPhysical Security Integration & Access Control

Near Field Communication

Page 41: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Questions

Q&A

Page 42: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Contacts Keith HarrisLENSEC(512) [email protected]

Page 43: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

Thanks for Attending Today’s Webinar

Page 44: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

SIS7-16 Webinar – Physical Security Integration & Access Control Part Two: Software & Best Practices Questions & Answers Poll Question #1 Access control rules apply to… 1. Doors 2. Users 3. Doors or Users, depending on the access control system 4. Neither 5. I don’t know

Poll Question #2 What is mustering? 1. Something you put on a sandwich 2. A technique for testing a server before deployment 3. Assembling the troops during inspection or events 4. Process for cutting into a door to install a mortise strike 5. I don’t know Poll Question #3 True or False: Most doors default to Fail Safe if you don’t have direction from the specifications or the AHJ.

1) True 2) False

What is Ingress & Egress? This is a topic I covered last month in Part One.

Ingress is traffic that is flowing into the building.

This is the most common place for an authorization point – building entrances.

Egress is traffic that is flowing out of the building.

Sometimes in higher security settings, authorization is logged at the egress point of a building as well.

Page 45: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

When you are evaluating an RFP to decide if you should pursue an access control project, are there certain things to keep in mind? Where should I begin? That could be a whole webinar in itself. Request For Proposals are notoriously vague and usually don’t give you all the answers to the questions. That’s where the building code and conversations with the AHJ come in. But you may not do that research until much later after you win the project.

The typical RFP usually does a great job lining out the contractual language from the agency or owner’s point of view. But, the contractor typically has to make a lot of educated guesses when they are preparing the project for bid.

Cover your bases and ask lots of questions. If you have a chance to go on a site visit – go. It will be well worth your time to walk the installation site. Get a picture in your mind about the entire scope of work and how that affects your part of the project. Go and actually see the door openings, if it isn’t new construction. A picture is literally worth a thousand words in this.

The contracting agency or owner will hold you to the contract in spite of the lack of details in the RFP. You, as the contractor, should assume that you have your bases covered if you choose to enter into the contract with the owner.

There are a lot of things to consider when planning an access control project. How do I make sure all my bases are covered? I recommend not tackling installation on your own as an amateur. There are just some things that require skill to accomplish. For example, if you’ve never cut into a door before to install a mortise strike, you might consider whether you would want to buy a replacement door or just hire the right guy with the right certification to do the job right the first time.

If you plan to do many of these, you may want to get trained and certified as an installer. There are several places you can receive certification. Some are general certifications, such as those presented by security industry associations. And, others are presented by manufacturers including details about their product.

I also recommend doing a lot of research on your own. Tackling a large scope project will require a lot of forethought and planning to make sure your bases are covered. We’ll present a webinar in July that addresses that topic. We’re covering Planning Security Technology Upgrades in next month’s Step Into Security Webinar. When we follow up, we’ll provide more details and a link so you can register for that free security training event.

What is the difference between an access control panel and an IP based or server based access control system? Well, we didn’t get to much into that in our presentation due to lack of time to address all topics. Some access systems have no server. The system controllers or panels contain the hardware for administering the system. Under these circumstances, no external server is needed. You will find this more common in small or highly dispersed access systems.

Page 46: Step Into Security Webinar - Physical Security Integration & Access Control - Part Two - Software & Best Practices

An example of this is the Axis Entry Manager that is available for Axis security systems. This solution is not a full-featured enterprise system. It is only designed to control up to 66 doors and misses out on several ‘nice-to-have’ features – such as no Live View and no Reporting.

Why are fire doors fail secure? It’s critical for fire doors to stay closed during a fire. The fire door provides structural barriers to prevent a fire from spreading throughout a building. This is a life safety issue.

While it may not make sense to lock a door during a fire, keep in mind these are ingress or interior doors and not emergency exits. Emergency exits MUST allow egress at all times.

Again, when we are saying Fail Secure, this means the door locks when power fails. At any rate, careful planning is required. If you have more questions about Fail Safe or Fail Secure, you should take a look at Part One of this webinar series. We cover the topic extensively.

What is a delayed egress door? A Delayed Egress Door is also referred to as a “Nanny” Door. These are systems that temporarily lock inhabitants in. They are uses sometimes in nursing facilities or psychiatric wards in hospitals. These doors are subject to special authority. The will probably be governed by code. The code will cover specifics like how long to delay period can be – 15 to 30 seconds is common. They may even sound an alarm before opening.