{"id":109,"date":"2020-11-07T17:11:31","date_gmt":"2020-11-07T17:11:31","guid":{"rendered":"https:\/\/hellsbells.uk\/?page_id=109"},"modified":"2020-11-10T17:11:42","modified_gmt":"2020-11-10T17:11:42","slug":"access-commercial","status":"publish","type":"page","link":"https:\/\/hellsbells.uk\/index.php\/access-commercial\/","title":{"rendered":"Access &#8211; Commercial"},"content":{"rendered":"<p><strong>Introduction<\/strong><\/p>\n<p>For\u00a0business\u00a0owners,\u00a0security\u00a0can be very important. As well as the\u00a0security\u00a0of physical\u00a0property\u00a0it is also important to protect\u00a0equipment, staff,\u00a0visitors, and\u00a0information.\u00a0Security\u00a0can also be an important\u00a0consideration\u00a0on\u00a0construction sites.<\/p>\n<p>The\u00a0components\u00a0of a\u00a0commercial security system\u00a0might include:<\/p>\n<ul>\n<li>Access control.<\/li>\n<li>CCTV<\/li>\n<li>Intruder alarms.<\/li>\n<li>Perimeter security.<\/li>\n<li>Fire detection\u00a0systems.<\/li>\n<li>Integrated systems.<\/li>\n<\/ul>\n<p><strong>Access control<\/strong><\/p>\n<p>Access control\u00a0permits\u00a0access\u00a0by authorised personnel to a\u00a0site,\u00a0building,\u00a0room\u00a0or other secure\u00a0installation.\u00a0Electronic\u00a0access control\u00a0systems\u00a0may allow\u00a0access\u00a0using credentials such as:<\/p>\n<ul>\n<li>Passcodes<\/li>\n<li>PINs<\/li>\n<li>Key cards.<\/li>\n<li>Access\u00a0badges.<\/li>\n<li>Fingerprints<\/li>\n<li>Keys<\/li>\n<li>Key fobs.<\/li>\n<li>Video\u00a0verification.<\/li>\n<\/ul>\n<p>Access\u00a0information\u00a0can be transmitted to a centralised\u00a0access\u00a0system\u00a0where it can be compared to a database of authorised personnel.<\/p>\n<p><strong>CCTV\u00a0(closed-circuit TV)\u00a0systems<\/strong><\/p>\n<p>CCTV\u00a0systems\u00a0generally consist of a number of\u00a0security\u00a0cameras connected to a central\u00a0digital\u00a0video recorder (DVR) or computer by\u00a0cables\u00a0such as\u00a0ethernet\u00a0cables\u00a0or via a\u00a0Wi-Fi\u00a0signal. Cameras can include features such as:<\/p>\n<ul>\n<li>Infrared\u00a0or night\u00a0vision.<\/li>\n<li>License\u00a0plate or facial recognition.<\/li>\n<li>Automatic motion detectors.<\/li>\n<li>Lighting<\/li>\n<\/ul>\n<p>An important\u00a0consideration\u00a0when installing a\u00a0CCTV\u00a0system\u00a0is the\u00a0quality\u00a0of the recorded footage and the resolution of the cameras. A clear image is required if the footage is to be used in any legal proceedings. One difficulty for large businesses is how to\u00a0monitor\u00a0multiple camera feeds in a\u00a0cost effective\u00a0manner. Video\u00a0analytics\u00a0can help automate\u00a0CCTV\u00a0monitoring\u00a0and analyse footage without the need for additional manpower. Video\u00a0analytics\u00a0examines video\u00a0output\u00a0for recognisable patterns of movement that might be associated with suspicious behaviour, allowing surveillance to focus on potentially important events.<\/p>\n<p>Disk indexing and time-stamping can make it easier to locate footage.<\/p>\n<p>CCTV\u00a0images can be transmitted to a remote\u00a0monitoring\u00a0facility\u00a0or can be accessed on remote devices such as mobile phones, allowing responses to be controlled, such as police or\u00a0fire\u00a0service\u00a0action, or in some cases to permit\u00a0access\u00a0and de-activate\u00a0alarms.<\/p>\n<p><strong>Intruder alarms<\/strong><\/p>\n<p>Also known as\u00a0security\u00a0or burglar\u00a0alarms,\u00a0intruder alarms\u00a0detect unauthorised entry into a\u00a0site,\u00a0building,\u00a0room\u00a0or secure\u00a0installation\u00a0(such as a\u00a0safe). They can\u00a0work\u00a0through a number of sensor types, such as:<\/p>\n<ul>\n<li>Hermetically sealed switches.<\/li>\n<li>Passive infra-red motion detectors.<\/li>\n<li>Photoelectric\u00a0beam\u00a0systems.<\/li>\n<li>Glass\u00a0break\u00a0acoustic\u00a0detectors.<\/li>\n<\/ul>\n<p>The signals from these sensors are sent back to a central control\u00a0unit\u00a0via a wired or wireless network. In high-end\u00a0installations, these\u00a0units\u00a0may be located in a remote\u00a0facility\u00a0where staff\u00a0members\u00a0can\u00a0monitor\u00a0activities, mobilise\u00a0security\u00a0personnel or contact the police in an emergency.<\/p>\n<p>Intruder alarm\u00a0systems\u00a0may also emit an audible\u00a0alarm. This serves two purposes: it draws attention to the break-in, and makes it unpleasant for the intruder to remain onsite.<\/p>\n<p><strong>Perimeter security<\/strong><\/p>\n<p>Perimeter security\u00a0can prevent\u00a0access\u00a0onto a\u00a0property\u00a0through means such as;\u00a0walls,\u00a0fences, infra-red\u00a0perimeter\u00a0beams,\u00a0bollards\u00a0and so on. At the\u00a0points\u00a0of entry,\u00a0security\u00a0guards or other\u00a0access controls\u00a0may be\u00a0installed. Gates,\u00a0barriers, turnstiles, shutters, and\u00a0screens\u00a0can be used to close these\u00a0points\u00a0outside of\u00a0business\u00a0hours. Care must be taken that the\u00a0property\u2019s\u00a0exterior\u00a0is independent from\u00a0trees, shrubs and other obstacles which could be used to approach the\u00a0building\u00a0while hidden from sight.<\/p>\n<p><strong>Fire detection\u00a0systems<\/strong><\/p>\n<p>A\u00a0fire detection\u00a0system\u00a0can consist of a number of\u00a0components, including:<\/p>\n<ul>\n<li>Manual pull stations.<\/li>\n<li>Break\u00a0glass\u00a0stations.<\/li>\n<li>Heat detectors.<\/li>\n<li>Smoke detectors.<\/li>\n<li>Magnetic\u00a0fire doors.<\/li>\n<li>Sprinklers<\/li>\n<li>Evacuation signals and\u00a0signage.<\/li>\n<li>Alarms<\/li>\n<li>Carbon dioxide\u00a0detectors.<\/li>\n<\/ul>\n<p>As with\u00a0intruder alarms,\u00a0fire detection\u00a0systems\u00a0can include remote\u00a0monitoring.<\/p>\n<p><strong>Integrated systems<\/strong><\/p>\n<p>If these\u00a0systems\u00a0are\u00a0operated\u00a0separately,\u00a0costs\u00a0can be higher, decisions poorer, and responses inappropriate. Instead,\u00a0access controls,\u00a0alarms, sensors, and responses, can be integrated into one\u00a0system, sometimes as part of a wider\u00a0building management system. This can permit greater control, better response and improved\u00a0flexibility, for example,\u00a0setting\u00a0different configurations for weekends, holidays and night time\u00a0security, turning\u00a0lights\u00a0on and off, controlling\u00a0blinds\u00a0and controlling cameras.<\/p>\n<p>Systems\u00a0might\u00a0operate\u00a0across a number of\u00a0sites.<\/p>\n<p><strong>Security\u00a0assessments<\/strong><\/p>\n<p>Security\u00a0assessments can be useful to assess the needs of an\u00a0organisation\u00a0and its\u00a0estate\u00a0and to determine its weak\u00a0points. Advice can then be given on which\u00a0components\u00a0are necessary to\u00a0build\u00a0an effective\u00a0system\u00a0that reduces incidents\u00a0on site. A thorough assessment will also take local crime trends into account when devising a solution.<\/p>\n<p>It is important that\u00a0security\u00a0solutions remain up-to-date, reflecting emerging\u00a0threats\u00a0and changing\u00a0business\u00a0needs, and that\u00a0systems\u00a0and procedures are tested and re-assessed regularly.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction For\u00a0business\u00a0owners,\u00a0security\u00a0can be very important. As well as the\u00a0security\u00a0of physical\u00a0property\u00a0it is also important to protect\u00a0equipment, staff,\u00a0visitors, and\u00a0information.\u00a0Security\u00a0can also be an important\u00a0consideration\u00a0on\u00a0construction sites. The\u00a0components\u00a0of a\u00a0commercial security system\u00a0might include: Access control. CCTV Intruder alarms. Perimeter security. Fire detection\u00a0systems. Integrated systems. Access control Access control\u00a0permits\u00a0access\u00a0by authorised personnel to a\u00a0site,\u00a0building,\u00a0room\u00a0or other secure\u00a0installation.\u00a0Electronic\u00a0access control\u00a0systems\u00a0may allow\u00a0access\u00a0using credentials such as: Passcodes PINs [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-109","page","type-page","status-publish","hentry"],"aioseo_notices":[],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/hellsbells.uk\/index.php\/wp-json\/wp\/v2\/pages\/109","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hellsbells.uk\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/hellsbells.uk\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/hellsbells.uk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hellsbells.uk\/index.php\/wp-json\/wp\/v2\/comments?post=109"}],"version-history":[{"count":3,"href":"https:\/\/hellsbells.uk\/index.php\/wp-json\/wp\/v2\/pages\/109\/revisions"}],"predecessor-version":[{"id":135,"href":"https:\/\/hellsbells.uk\/index.php\/wp-json\/wp\/v2\/pages\/109\/revisions\/135"}],"wp:attachment":[{"href":"https:\/\/hellsbells.uk\/index.php\/wp-json\/wp\/v2\/media?parent=109"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}