SlideShare a Scribd company logo
1 of 43
Download to read offline
Physical Security Integration &
Access Control
---
Part 1: Concepts & Components
Today’s
Moderator
David Martin
Physical Security
Technical Specialist
LENSEC
Webinar
Sponsor
Based in Houston, TX
Since 1998
IP Video Management
System Design
Installation
Project Management
LENSEC is committed to empowering our clients and partners to prevent or mitigate physical
security risks. We want to help protect people and assets as well as improve operations through
our evolutionary and intuitive technology. We can do this by providing expertise in security and
software development.
Our Mission
Webinar
Logistics
Q&A at the end
Questions for the panelist
Audio from attendees muted
Poll questions
Survey
Keith Harris
Marketing Manager
LENSEC
Today’s
Panelist
Expertise in Photography & Video Production
Experience in Physical Security Market
Trainer for Surveillance & Physical Security Techniques
Training
Goal
Physical Security Integration & Access Control
Part 1: Concepts & Components
Topics for Webinar:
Access Control Deployment
Building & Fire Codes
Security Integration
Choosing Components
Preventive Control – keeps undesirable events from happening
Detective Control – identifies undesirable events that have occurred
Corrective Control – corrects undesirable events that have occurred
Deterrent Control – discourages security violations from taking place
Recovery Control – restores resources & capabilities after an event
Access Control Categories & Concepts
Physical Security Integration & Access Control
Layers of Protection
Unifying Your Security Platform
Cross Functional
Basic Functions - YES
Advanced Features – Maybe Not
Security Integration
Physical Security Integration & Access Control
Interior
Entrance/Exit
Hallways
Offices
Access Control Environment
Physical Security Integration & Access Control
Exterior
Parking Lots
Perimeter
Warehouse
Access Control Environment
Physical Security Integration & Access Control
Poll
Question
Poll Question #1
What is the primary concern when
regulating access control?
Building & Fire Codes
Passive vs. Active
Security Systems
Primary Directive
Rules & Standards
Physical Security Integration & Access Control
Building & Fire Codes
NFPA – National Fire Protection
Association
NFPA101 – Life Safety Code
NFPA72 – Primarily Covers Fire
Alarms
IBC – International Building Code
Rules & Standards
Physical Security Integration & Access Control
National Fire Protection Assoc. Codes & Standards: http://www.nfpa.org/codes-and-standards/document-information-pages
International Building Code: http://www.iccsafe.org/codes-tech-support/codes/2015-i-codes/ibc/
AHJ – Authority Having
Jurisdiction
Rules & Standards
Physical Security Integration & Access Control
AHJ – Authority Having
Jurisdiction
Fire Marshal
Building Inspector
Health Department
Engineers/Architects
Senior Executives
Utility Companies
Insurance Companies
Rules & Standards
Physical Security Integration & Access Control
Legacy BOCA
Americans with Disabilities Act (ADA)
UL 294
Rules & Standards
Physical Security Integration & Access Control
Zero Downtime
High Availability
Five Nines
Rules & Standards
Physical Security Integration & Access Control
Nines Availability Downtime
1 90% 36.5 days/year
2 99% 3.65 days/year
3 99.9% 8.76 hours/year
4 99.99% 52 minutes/year
5 99.999% 5.25 minutes/year
Five Nines
Of High Availability

24/7 Operation
Alarm Monitoring System
Live Video Monitoring
Video Verification
Intrusion Detection & Fire Alarms
Access Control Equipment
Access Control System
Physical Security Integration & Access Control
Poll
Question
Poll Question #2
To which side of the door are
Fail Safe & Fail Secure relevant?
Access Control System
Physical Security Integration & Access Control
Fail Safe – Locks are Released
Fail Secure – Locks are Secured
Applies to Entry Control Only
Manual Egress Allowed
Mechanical Override Key
Stairwell Doors
Fire Doors
Door Types
Mounting Positions
Door Movement
Mounting Convenience
Access Control System
Physical Security Integration & Access Control
Choosing Locks
Cylindrical Lock
Mortise Lock
Surface Lock
Deadbolt Lock
Deadlatch Locks
Access Control Components
Physical Security Integration & Access Control
Cylindrical
Lock
Mortise
Lock
Surface LockDeadbolt LockDeadlatch Lock
Maglocks
Power
Fail Safe by Default
Bond Rating
Door Orientation
Out Swinging Door
In Swinging Door (Z bracket)
Double Door Maglocks
Access Control Components
Physical Security Integration & Access Control
Maglock
Armature
&
Magnet
Z Bracket
Double
Maglock
Door Strikes
Keeper
Fail Safe/Fail Secure Switch
Low Voltage: AC/DC
Mortise Strike
Surface Strike
Latch Protector
Access Control Components
Physical Security Integration & Access Control
Mortise Strike
Surface Strike
Latch Protector
Wireless Locks
Integrated Locks
Wireless Card Reader
Interface
Proprietary Wireless
Frequency
Wi-Fi Locks
Access Control Components
Physical Security Integration & Access Control
Other Lock Types
Electronic Lockset
Electronic Bolt
Access Control Components
Physical Security Integration & Access Control
Electronic
Lockset
Electronic
Bolt
Exit Devices
Request To Exit
Crash Bar
PIR-RTE
Push Button
Access Control Components
Physical Security Integration & Access Control
Credentials
Form
Badge, Fob, Etc.
Type
Prox
iClass
Protocol
HID Global
NXP Semiconductor
Access Control Components
Physical Security Integration & Access Control
Keyfob Badge Clamshell
Authorization Interface
Card Reader
Ingress/Egress
Access Control Components
Physical Security Integration & Access Control
Authorization Interface
Card Readers
Wiegand Protocol
OSDP Protocol
Credentials
Standard Proximity
Smartcards
Barcode/Magstripe
Gesture Sensitive
Access Control Components
Physical Security Integration & Access Control
Authorization Interface
Keypad
Oldest & Most Common
Diminished Security
Password Protection
Shoulder Surfing
Access Control Components
Physical Security Integration & Access Control
Authorization Interface
Biometrics
Fingerprint
Hand Geometry
Retinal Scan
Iris Scan
Facial Recognition
Access Control Components
Physical Security Integration & Access Control
Authorization Factors
Visual Verification
Multifactor Credentials
Possession: Something You Have
Knowledge: Something You Know
Characteristic: Something You Are
Trusted Verification: Someone Trusted
Verifies You
Access Control Concepts
Physical Security Integration & Access Control
Authorization Factors
Multifactor Credentials
2 Factors – Keyfob & PIN
3 Factors – Keyfob, PIN & Fingerprint
4 Factors – Keyfob, PIN, Fingerprint &
Manned Checkpoint
Access Control Concepts
Physical Security Integration & Access Control
Door Controllers
Bridge the Gap
CAN Controllers
Standalone Controllers
Integrated Controllers
Access Control Components
Physical Security Integration & Access Control
Transmission & Networks
IP-Based Transmission
Power over Ethernet (PoE)
802.3af – 15.4W power
802.3at – 25.5W power
Access Control Components
Physical Security Integration & Access Control
Physical Security Integration & Access Control
Transmission & Networks
Hardwired / Serial Connected Cable Systems
6 Conductor Cable
4 Conductor Cable / 8 Conductor Cable
2 Conductor Cable
Drain Wire
Access Control Components
Physical Security Integration & Access Control
Questions
Q&A
Contacts
David Martin
LENSEC
(512) 318-3829
dmartin@lensec.com
Keith Harris
LENSEC
(512) 913-3907
kharris@lensec.com
Thanks for Attending
Today’s Webinar
SIS5-16 Webinar – Physical Security Integration & Access Control
Part One: Concepts & Components
Questions & Answers
Poll Question #1
What is the primary concern when regulating access control?
1. Integrating many different building systems
2. Carefully reading the specifications
3. Life safety
4. Knowing who has jurisdiction for code enforcement
Poll Question #2
To which side of the door are Fail Safe & Fail Secure relevant?
1. The entry side of the door
2. The exit side of the door
3. Both sides of the door
4. Neither side of the door
Which version of the building and fire codes should I follow?
That is not always an easy answer. The right thing to do is follow the version of the code that the AHJ
follows. This could vary among entities. The most recent version of the NFPA 101 Life Safety Code is
2015, though many jurisdictions are still working off of 2012 rules or earlier. The AHJ has the authority
to adopt the code. So, when in doubt, check with the AHJ for clarification.
When using a Fail Safe lock, the door becomes unlocked when there is a power failure. How does
the owner prevent a security risk?
I’ve seen that as a concern before. You can’t auto lock the doors in those situations because that defeats
the purpose of life safety. You can provide a mechanical lock and have security or a designated person
go and manually lock the doors after an inspection of the building. However, the mechanical lock should
be used on a regular basis since free egress should be maintained. Fail Secure hardware locations might
require a Mechanical Override Key to manually lock doors for building security when the power is
down.
Proper use dictates that these keys are only used on an emergency basis and held by a limited number
of key holders.
How does access control work with building systems like the fire alarm?
A fire alarm pull is not an exit device, but it works like one – sort of. The fire alarm is configured to drop
lock power when the fire pull is activated. Maglocks and access control systems have contacts to tie into
the fire alarm. AHJs may require proof of successful access control override by the fire pulls.
When you’re choosing a wireless or WiFi lockset, do each have to be within range of the access
point?
Range is a consideration. Each location should be tested to make sure it is in range of the network
access point. Some of these locks are designed with a MIMO style network for lock communications.
This would require a system hub to located within range of every lock. A single system hub might
manage 12 or more doors within its range.
Are there other types of Request To Exit devices for uncommon installation circumstances?
A less common device is an RTE Pressure Pad placed in front of a door to break power when a person
stand on it. These work best when installed under carpets or flooring, though this might complicate
maintenance. Pressure Pads might be used in areas where hand contact with the door or PIRs are not
permitted, such as a clean room or explosive areas.

More Related Content

What's hot

Monitoring ICS Communications
Monitoring ICS CommunicationsMonitoring ICS Communications
Monitoring ICS CommunicationsDigital Bond
 
Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Yokogawa1
 
Owasp Proactive Controls for Web developer
Owasp  Proactive Controls for Web developerOwasp  Proactive Controls for Web developer
Owasp Proactive Controls for Web developerSameer Paradia
 
Internet Accessible ICS in Japan (English)
Internet Accessible ICS in Japan (English)Internet Accessible ICS in Japan (English)
Internet Accessible ICS in Japan (English)Digital Bond
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint SecurityBurak DAYIOGLU
 
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)Byres Security Inc.
 
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...Digital Bond
 
Practical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and ProductionPractical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and ProductionJim Gilsinn
 
Compromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayCompromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayEnergySec
 
Accelerating OT - A Case Study
Accelerating OT - A Case StudyAccelerating OT - A Case Study
Accelerating OT - A Case StudyDigital Bond
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCommunity Protection Forum
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended Larry Vandenaweele
 
CompTIA Security+ Guide
CompTIA Security+ GuideCompTIA Security+ Guide
CompTIA Security+ GuideSmithjulia33
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 
Defcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopDefcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopPriyanka Aash
 
DHS ICS Security Presentation
DHS ICS Security PresentationDHS ICS Security Presentation
DHS ICS Security Presentationguest85a34f
 
Managing your access control systems
Managing your access control systemsManaging your access control systems
Managing your access control systemsWalter Sinchak,
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Samuel Kamuli
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewCamilo Fandiño Gómez
 

What's hot (20)

Monitoring ICS Communications
Monitoring ICS CommunicationsMonitoring ICS Communications
Monitoring ICS Communications
 
Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443Secure Systems Security and ISA99- IEC62443
Secure Systems Security and ISA99- IEC62443
 
Owasp Proactive Controls for Web developer
Owasp  Proactive Controls for Web developerOwasp  Proactive Controls for Web developer
Owasp Proactive Controls for Web developer
 
Internet Accessible ICS in Japan (English)
Internet Accessible ICS in Japan (English)Internet Accessible ICS in Japan (English)
Internet Accessible ICS in Japan (English)
 
Redefining Endpoint Security
Redefining Endpoint SecurityRedefining Endpoint Security
Redefining Endpoint Security
 
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
ANSI/ISA-99 and Intrinsically Secure Systems (May 2009)
 
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
Case Study: Running a DCS in a Highly Virtualized Environment, Chris Hughes o...
 
Practical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and ProductionPractical Approaches to Securely Integrating Business and Production
Practical Approaches to Securely Integrating Business and Production
 
Compromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles AwayCompromising Industrial Facilities From 40 Miles Away
Compromising Industrial Facilities From 40 Miles Away
 
Accelerating OT - A Case Study
Accelerating OT - A Case StudyAccelerating OT - A Case Study
Accelerating OT - A Case Study
 
Cyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT ApproachCyber Security: Differences between Industrial Control Systems and ICT Approach
Cyber Security: Differences between Industrial Control Systems and ICT Approach
 
The journey to ICS - Extended
The journey to ICS - Extended The journey to ICS - Extended
The journey to ICS - Extended
 
CompTIA Security+ Guide
CompTIA Security+ GuideCompTIA Security+ Guide
CompTIA Security+ Guide
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 
IBM Security QFlow & Vflow
IBM Security QFlow & VflowIBM Security QFlow & Vflow
IBM Security QFlow & Vflow
 
Defcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shopDefcon 22-tim-mcguffin-one-man-shop
Defcon 22-tim-mcguffin-one-man-shop
 
DHS ICS Security Presentation
DHS ICS Security PresentationDHS ICS Security Presentation
DHS ICS Security Presentation
 
Managing your access control systems
Managing your access control systemsManaging your access control systems
Managing your access control systems
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
IBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence OverviewIBM QRadar Security Intelligence Overview
IBM QRadar Security Intelligence Overview
 

Viewers also liked

Step Into Security Webinar - Planning for Outdoor Video Surveillance Projects
Step Into Security Webinar - Planning for Outdoor Video Surveillance ProjectsStep Into Security Webinar - Planning for Outdoor Video Surveillance Projects
Step Into Security Webinar - Planning for Outdoor Video Surveillance ProjectsKeith Harris
 
Step Into Security Webinar - Improving Physical Security on Your Campus
Step Into Security Webinar - Improving Physical Security on Your Campus Step Into Security Webinar - Improving Physical Security on Your Campus
Step Into Security Webinar - Improving Physical Security on Your Campus Keith Harris
 
Step Into Security Webinar - Securing Your Facilities Using Technology
Step Into Security Webinar - Securing Your Facilities Using Technology Step Into Security Webinar - Securing Your Facilities Using Technology
Step Into Security Webinar - Securing Your Facilities Using Technology Keith Harris
 
Step Into Security Webinar - Surveillance Solutions in Special Education Clas...
Step Into Security Webinar - Surveillance Solutions in Special Education Clas...Step Into Security Webinar - Surveillance Solutions in Special Education Clas...
Step Into Security Webinar - Surveillance Solutions in Special Education Clas...Keith Harris
 
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...Keith Harris
 
LENSEC Corporate Presentation 2017
LENSEC Corporate Presentation 2017LENSEC Corporate Presentation 2017
LENSEC Corporate Presentation 2017Keith Harris
 
The impact of cloud technologies on the video surveillance market
The impact of cloud technologies on the video surveillance market The impact of cloud technologies on the video surveillance market
The impact of cloud technologies on the video surveillance market Ivideon
 
Children of North Korea
Children of North KoreaChildren of North Korea
Children of North Koreamaditabalnco
 
Secondary 2 History-Singapore Merging With Malaya
Secondary 2 History-Singapore Merging With MalayaSecondary 2 History-Singapore Merging With Malaya
Secondary 2 History-Singapore Merging With MalayaMarioSonic54
 
FIRE AND SAFETY
FIRE AND SAFETYFIRE AND SAFETY
FIRE AND SAFETYraees4all
 
IP Video Surveillance
IP Video SurveillanceIP Video Surveillance
IP Video Surveillancedmerces
 
Photos of North Korea
Photos of North KoreaPhotos of North Korea
Photos of North Koreaguimera
 
Physical Security Domain
Physical Security DomainPhysical Security Domain
Physical Security Domainamiable_indian
 

Viewers also liked (15)

Step Into Security Webinar - Planning for Outdoor Video Surveillance Projects
Step Into Security Webinar - Planning for Outdoor Video Surveillance ProjectsStep Into Security Webinar - Planning for Outdoor Video Surveillance Projects
Step Into Security Webinar - Planning for Outdoor Video Surveillance Projects
 
Step Into Security Webinar - Improving Physical Security on Your Campus
Step Into Security Webinar - Improving Physical Security on Your Campus Step Into Security Webinar - Improving Physical Security on Your Campus
Step Into Security Webinar - Improving Physical Security on Your Campus
 
Step Into Security Webinar - Securing Your Facilities Using Technology
Step Into Security Webinar - Securing Your Facilities Using Technology Step Into Security Webinar - Securing Your Facilities Using Technology
Step Into Security Webinar - Securing Your Facilities Using Technology
 
Step Into Security Webinar - Surveillance Solutions in Special Education Clas...
Step Into Security Webinar - Surveillance Solutions in Special Education Clas...Step Into Security Webinar - Surveillance Solutions in Special Education Clas...
Step Into Security Webinar - Surveillance Solutions in Special Education Clas...
 
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...
Step Into Security Webinar - IP Security Camera Techniques for Video Surveill...
 
LENSEC Corporate Presentation 2017
LENSEC Corporate Presentation 2017LENSEC Corporate Presentation 2017
LENSEC Corporate Presentation 2017
 
The impact of cloud technologies on the video surveillance market
The impact of cloud technologies on the video surveillance market The impact of cloud technologies on the video surveillance market
The impact of cloud technologies on the video surveillance market
 
The Impact of proposed Baram dam on Women
The Impact of proposed Baram dam on WomenThe Impact of proposed Baram dam on Women
The Impact of proposed Baram dam on Women
 
Children of North Korea
Children of North KoreaChildren of North Korea
Children of North Korea
 
Secondary 2 History-Singapore Merging With Malaya
Secondary 2 History-Singapore Merging With MalayaSecondary 2 History-Singapore Merging With Malaya
Secondary 2 History-Singapore Merging With Malaya
 
FIRE AND SAFETY
FIRE AND SAFETYFIRE AND SAFETY
FIRE AND SAFETY
 
IP Video Surveillance
IP Video SurveillanceIP Video Surveillance
IP Video Surveillance
 
Photos of North Korea
Photos of North KoreaPhotos of North Korea
Photos of North Korea
 
Physical Security Management System
Physical Security Management SystemPhysical Security Management System
Physical Security Management System
 
Physical Security Domain
Physical Security DomainPhysical Security Domain
Physical Security Domain
 

Similar to Step Into Security Webinar - Physical Security Integration & Access Control - Part One - Concepts & Components

Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessMicrosoft Tech Community
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsKenny Huang Ph.D.
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar finalAlgoSec
 
AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011dma1965
 
Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Niraj Kumar
 
Securing control systems v0.4
Securing control systems v0.4Securing control systems v0.4
Securing control systems v0.4CrispnCrunch
 
CompTIA Security+ Objectives
CompTIA Security+ ObjectivesCompTIA Security+ Objectives
CompTIA Security+ Objectivessombat nirund
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint SecurityBen Rothke
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solutionmatthew.maisel
 
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint WebinarCisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint WebinarAlgoSec
 
Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges Nathan Wallace, PhD, PE
 
Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWKapil Kanugo
 
Cyber securityppt
Cyber securitypptCyber securityppt
Cyber securitypptSachin Roy
 
Endpoint Security for Mobile Devices
Endpoint Security for Mobile DevicesEndpoint Security for Mobile Devices
Endpoint Security for Mobile DevicesDavid Shepherd
 
Cisco Phy Sec Overview Netversant
Cisco Phy Sec Overview   NetversantCisco Phy Sec Overview   Netversant
Cisco Phy Sec Overview NetversantJayCase
 
Yared Hankins Wireless Key
Yared Hankins Wireless KeyYared Hankins Wireless Key
Yared Hankins Wireless Keysolvecore
 

Similar to Step Into Security Webinar - Physical Security Integration & Access Control - Part One - Concepts & Components (20)

Removing Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment SuccessRemoving Security Roadblocks to IoT Deployment Success
Removing Security Roadblocks to IoT Deployment Success
 
IoT Security and Privacy Considerations
IoT Security and Privacy ConsiderationsIoT Security and Privacy Considerations
IoT Security and Privacy Considerations
 
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
2019 06-26 effective multi-vendor management -fortinet algo sec webinar final
 
AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011AMI Security 101 - Smart Grid Security East 2011
AMI Security 101 - Smart Grid Security East 2011
 
02 ibm security for smart grids
02 ibm security for smart grids02 ibm security for smart grids
02 ibm security for smart grids
 
Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013Total Security Solutions-30 BATCH 11-10-2013
Total Security Solutions-30 BATCH 11-10-2013
 
Securing control systems v0.4
Securing control systems v0.4Securing control systems v0.4
Securing control systems v0.4
 
CompTIA Security+ Objectives
CompTIA Security+ ObjectivesCompTIA Security+ Objectives
CompTIA Security+ Objectives
 
Top Tactics For Endpoint Security
Top Tactics For Endpoint SecurityTop Tactics For Endpoint Security
Top Tactics For Endpoint Security
 
The 300 Leonidas Solution
The 300 Leonidas SolutionThe 300 Leonidas Solution
The 300 Leonidas Solution
 
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint WebinarCisco Firepower Migration | Cisco and AlgoSec Joint Webinar
Cisco Firepower Migration | Cisco and AlgoSec Joint Webinar
 
Company Profile
Company ProfileCompany Profile
Company Profile
 
Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges Power System Cybersecurity: Barriers and Challenges
Power System Cybersecurity: Barriers and Challenges
 
Hacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOWHacking your Connected Car: What you need to know NOW
Hacking your Connected Car: What you need to know NOW
 
Cyber securityppt
Cyber securitypptCyber securityppt
Cyber securityppt
 
Access-Control-101-Book.pdf
Access-Control-101-Book.pdfAccess-Control-101-Book.pdf
Access-Control-101-Book.pdf
 
PLN9 Surveillance
PLN9 SurveillancePLN9 Surveillance
PLN9 Surveillance
 
Endpoint Security for Mobile Devices
Endpoint Security for Mobile DevicesEndpoint Security for Mobile Devices
Endpoint Security for Mobile Devices
 
Cisco Phy Sec Overview Netversant
Cisco Phy Sec Overview   NetversantCisco Phy Sec Overview   Netversant
Cisco Phy Sec Overview Netversant
 
Yared Hankins Wireless Key
Yared Hankins Wireless KeyYared Hankins Wireless Key
Yared Hankins Wireless Key
 

More from Keith Harris

Step Into Security Webinar - Threat Assessments for K-12 & University Campuses
Step Into Security Webinar - Threat Assessments for K-12 & University CampusesStep Into Security Webinar - Threat Assessments for K-12 & University Campuses
Step Into Security Webinar - Threat Assessments for K-12 & University CampusesKeith Harris
 
Step Into Security Webinar - Securing Campuses for the New School Year
Step Into Security Webinar - Securing Campuses for the New School Year Step Into Security Webinar - Securing Campuses for the New School Year
Step Into Security Webinar - Securing Campuses for the New School Year Keith Harris
 
Step Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in SchoolsStep Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in SchoolsKeith Harris
 
Step Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at SchoolsStep Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at SchoolsKeith Harris
 
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus Keith Harris
 
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...Step Into Security Webinar - School Emergency Response Plans & The Active Sho...
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...Keith Harris
 

More from Keith Harris (6)

Step Into Security Webinar - Threat Assessments for K-12 & University Campuses
Step Into Security Webinar - Threat Assessments for K-12 & University CampusesStep Into Security Webinar - Threat Assessments for K-12 & University Campuses
Step Into Security Webinar - Threat Assessments for K-12 & University Campuses
 
Step Into Security Webinar - Securing Campuses for the New School Year
Step Into Security Webinar - Securing Campuses for the New School Year Step Into Security Webinar - Securing Campuses for the New School Year
Step Into Security Webinar - Securing Campuses for the New School Year
 
Step Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in SchoolsStep Into Security Webinar - Threat Assessments in Schools
Step Into Security Webinar - Threat Assessments in Schools
 
Step Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at SchoolsStep Into Security Webinar – Best Practices for Bomb Threat Response at Schools
Step Into Security Webinar – Best Practices for Bomb Threat Response at Schools
 
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus
Step Into Security Webinar - Video Surveillance in Classrooms & Around Campus
 
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...Step Into Security Webinar - School Emergency Response Plans & The Active Sho...
Step Into Security Webinar - School Emergency Response Plans & The Active Sho...
 

Recently uploaded

Call Girls Delhi {Rohini} 9711199012 high profile service
Call Girls Delhi {Rohini} 9711199012 high profile serviceCall Girls Delhi {Rohini} 9711199012 high profile service
Call Girls Delhi {Rohini} 9711199012 high profile servicerehmti665
 
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...Amil Baba Dawood bangali
 
RBS学位证,鹿特丹商学院毕业证书1:1制作
RBS学位证,鹿特丹商学院毕业证书1:1制作RBS学位证,鹿特丹商学院毕业证书1:1制作
RBS学位证,鹿特丹商学院毕业证书1:1制作f3774p8b
 
(办理学位证)多伦多大学毕业证成绩单原版一比一
(办理学位证)多伦多大学毕业证成绩单原版一比一(办理学位证)多伦多大学毕业证成绩单原版一比一
(办理学位证)多伦多大学毕业证成绩单原版一比一C SSS
 
(办理学位证)韩国汉阳大学毕业证成绩单原版一比一
(办理学位证)韩国汉阳大学毕业证成绩单原版一比一(办理学位证)韩国汉阳大学毕业证成绩单原版一比一
(办理学位证)韩国汉阳大学毕业证成绩单原版一比一C SSS
 
the cOMPUTER SYSTEM - computer hardware servicing.pptx
the cOMPUTER SYSTEM - computer hardware servicing.pptxthe cOMPUTER SYSTEM - computer hardware servicing.pptx
the cOMPUTER SYSTEM - computer hardware servicing.pptxLeaMaePahinagGarciaV
 
vip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Book
vip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Bookvip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Book
vip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Bookmanojkuma9823
 
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)861c7ca49a02
 
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degreeyuu sss
 
专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degreeyuu sss
 
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degreeyuu sss
 
定制(RHUL学位证)伦敦大学皇家霍洛威学院毕业证成绩单原版一比一
定制(RHUL学位证)伦敦大学皇家霍洛威学院毕业证成绩单原版一比一定制(RHUL学位证)伦敦大学皇家霍洛威学院毕业证成绩单原版一比一
定制(RHUL学位证)伦敦大学皇家霍洛威学院毕业证成绩单原版一比一ss ss
 
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCR
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCRReal Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCR
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCRdollysharma2066
 
原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证
原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证
原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证gwhohjj
 
(办理学位证)加州州立大学北岭分校毕业证成绩单原版一比一
(办理学位证)加州州立大学北岭分校毕业证成绩单原版一比一(办理学位证)加州州立大学北岭分校毕业证成绩单原版一比一
(办理学位证)加州州立大学北岭分校毕业证成绩单原版一比一Fi sss
 
Hifi Babe North Delhi Call Girl Service Fun Tonight
Hifi Babe North Delhi Call Girl Service Fun TonightHifi Babe North Delhi Call Girl Service Fun Tonight
Hifi Babe North Delhi Call Girl Service Fun TonightKomal Khan
 
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一diploma 1
 
Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝
Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝
Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝soniya singh
 
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls DubaiDubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubaikojalkojal131
 

Recently uploaded (20)

Call Girls Delhi {Rohini} 9711199012 high profile service
Call Girls Delhi {Rohini} 9711199012 high profile serviceCall Girls Delhi {Rohini} 9711199012 high profile service
Call Girls Delhi {Rohini} 9711199012 high profile service
 
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
NO1 Certified Black Magic Specialist Expert In Bahawalpur, Sargodha, Sialkot,...
 
RBS学位证,鹿特丹商学院毕业证书1:1制作
RBS学位证,鹿特丹商学院毕业证书1:1制作RBS学位证,鹿特丹商学院毕业证书1:1制作
RBS学位证,鹿特丹商学院毕业证书1:1制作
 
(办理学位证)多伦多大学毕业证成绩单原版一比一
(办理学位证)多伦多大学毕业证成绩单原版一比一(办理学位证)多伦多大学毕业证成绩单原版一比一
(办理学位证)多伦多大学毕业证成绩单原版一比一
 
(办理学位证)韩国汉阳大学毕业证成绩单原版一比一
(办理学位证)韩国汉阳大学毕业证成绩单原版一比一(办理学位证)韩国汉阳大学毕业证成绩单原版一比一
(办理学位证)韩国汉阳大学毕业证成绩单原版一比一
 
the cOMPUTER SYSTEM - computer hardware servicing.pptx
the cOMPUTER SYSTEM - computer hardware servicing.pptxthe cOMPUTER SYSTEM - computer hardware servicing.pptx
the cOMPUTER SYSTEM - computer hardware servicing.pptx
 
vip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Book
vip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Bookvip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Book
vip Krishna Nagar Call Girls 9999965857 Call or WhatsApp Now Book
 
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
5S - House keeping (Seiri, Seiton, Seiso, Seiketsu, Shitsuke)
 
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国旧金山艺术学院毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
 
专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
专业一比一美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实工艺展示#真实防伪#diploma#degree
 
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
1:1原版定制美国加州州立大学东湾分校毕业证成绩单pdf电子版制作修改#真实留信入库#永久存档#真实可查#diploma#degree
 
定制(RHUL学位证)伦敦大学皇家霍洛威学院毕业证成绩单原版一比一
定制(RHUL学位证)伦敦大学皇家霍洛威学院毕业证成绩单原版一比一定制(RHUL学位证)伦敦大学皇家霍洛威学院毕业证成绩单原版一比一
定制(RHUL学位证)伦敦大学皇家霍洛威学院毕业证成绩单原版一比一
 
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCR
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCRReal Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCR
Real Sure (Call Girl) in I.G.I. Airport 8377087607 Hot Call Girls In Delhi NCR
 
原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证
原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证
原版1:1复刻斯坦福大学毕业证Stanford毕业证留信学历认证
 
9953330565 Low Rate Call Girls In Jahangirpuri Delhi NCR
9953330565 Low Rate Call Girls In Jahangirpuri  Delhi NCR9953330565 Low Rate Call Girls In Jahangirpuri  Delhi NCR
9953330565 Low Rate Call Girls In Jahangirpuri Delhi NCR
 
(办理学位证)加州州立大学北岭分校毕业证成绩单原版一比一
(办理学位证)加州州立大学北岭分校毕业证成绩单原版一比一(办理学位证)加州州立大学北岭分校毕业证成绩单原版一比一
(办理学位证)加州州立大学北岭分校毕业证成绩单原版一比一
 
Hifi Babe North Delhi Call Girl Service Fun Tonight
Hifi Babe North Delhi Call Girl Service Fun TonightHifi Babe North Delhi Call Girl Service Fun Tonight
Hifi Babe North Delhi Call Girl Service Fun Tonight
 
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一
办理(CSU毕业证书)澳洲查理斯特大学毕业证成绩单原版一比一
 
Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝
Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝
Call Girls in Dwarka Sub City 💯Call Us 🔝8264348440🔝
 
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls DubaiDubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
Dubai Call Girls O525547819 Spring Break Fast Call Girls Dubai
 

Step Into Security Webinar - Physical Security Integration & Access Control - Part One - Concepts & Components

  • 1. Physical Security Integration & Access Control --- Part 1: Concepts & Components
  • 3. Webinar Sponsor Based in Houston, TX Since 1998 IP Video Management System Design Installation Project Management LENSEC is committed to empowering our clients and partners to prevent or mitigate physical security risks. We want to help protect people and assets as well as improve operations through our evolutionary and intuitive technology. We can do this by providing expertise in security and software development. Our Mission
  • 4. Webinar Logistics Q&A at the end Questions for the panelist Audio from attendees muted Poll questions Survey
  • 5. Keith Harris Marketing Manager LENSEC Today’s Panelist Expertise in Photography & Video Production Experience in Physical Security Market Trainer for Surveillance & Physical Security Techniques
  • 6. Training Goal Physical Security Integration & Access Control Part 1: Concepts & Components Topics for Webinar: Access Control Deployment Building & Fire Codes Security Integration Choosing Components
  • 7. Preventive Control – keeps undesirable events from happening Detective Control – identifies undesirable events that have occurred Corrective Control – corrects undesirable events that have occurred Deterrent Control – discourages security violations from taking place Recovery Control – restores resources & capabilities after an event Access Control Categories & Concepts Physical Security Integration & Access Control
  • 8. Layers of Protection Unifying Your Security Platform Cross Functional Basic Functions - YES Advanced Features – Maybe Not Security Integration Physical Security Integration & Access Control
  • 10. Exterior Parking Lots Perimeter Warehouse Access Control Environment Physical Security Integration & Access Control
  • 11. Poll Question Poll Question #1 What is the primary concern when regulating access control?
  • 12. Building & Fire Codes Passive vs. Active Security Systems Primary Directive Rules & Standards Physical Security Integration & Access Control
  • 13. Building & Fire Codes NFPA – National Fire Protection Association NFPA101 – Life Safety Code NFPA72 – Primarily Covers Fire Alarms IBC – International Building Code Rules & Standards Physical Security Integration & Access Control National Fire Protection Assoc. Codes & Standards: http://www.nfpa.org/codes-and-standards/document-information-pages International Building Code: http://www.iccsafe.org/codes-tech-support/codes/2015-i-codes/ibc/
  • 14. AHJ – Authority Having Jurisdiction Rules & Standards Physical Security Integration & Access Control
  • 15. AHJ – Authority Having Jurisdiction Fire Marshal Building Inspector Health Department Engineers/Architects Senior Executives Utility Companies Insurance Companies Rules & Standards Physical Security Integration & Access Control
  • 16. Legacy BOCA Americans with Disabilities Act (ADA) UL 294 Rules & Standards Physical Security Integration & Access Control
  • 17. Zero Downtime High Availability Five Nines Rules & Standards Physical Security Integration & Access Control Nines Availability Downtime 1 90% 36.5 days/year 2 99% 3.65 days/year 3 99.9% 8.76 hours/year 4 99.99% 52 minutes/year 5 99.999% 5.25 minutes/year Five Nines Of High Availability 
  • 18. 24/7 Operation Alarm Monitoring System Live Video Monitoring Video Verification Intrusion Detection & Fire Alarms Access Control Equipment Access Control System Physical Security Integration & Access Control
  • 19. Poll Question Poll Question #2 To which side of the door are Fail Safe & Fail Secure relevant?
  • 20. Access Control System Physical Security Integration & Access Control Fail Safe – Locks are Released Fail Secure – Locks are Secured Applies to Entry Control Only Manual Egress Allowed Mechanical Override Key Stairwell Doors Fire Doors
  • 21. Door Types Mounting Positions Door Movement Mounting Convenience Access Control System Physical Security Integration & Access Control
  • 22. Choosing Locks Cylindrical Lock Mortise Lock Surface Lock Deadbolt Lock Deadlatch Locks Access Control Components Physical Security Integration & Access Control Cylindrical Lock Mortise Lock Surface LockDeadbolt LockDeadlatch Lock
  • 23. Maglocks Power Fail Safe by Default Bond Rating Door Orientation Out Swinging Door In Swinging Door (Z bracket) Double Door Maglocks Access Control Components Physical Security Integration & Access Control Maglock Armature & Magnet Z Bracket Double Maglock
  • 24. Door Strikes Keeper Fail Safe/Fail Secure Switch Low Voltage: AC/DC Mortise Strike Surface Strike Latch Protector Access Control Components Physical Security Integration & Access Control Mortise Strike Surface Strike Latch Protector
  • 25. Wireless Locks Integrated Locks Wireless Card Reader Interface Proprietary Wireless Frequency Wi-Fi Locks Access Control Components Physical Security Integration & Access Control
  • 26. Other Lock Types Electronic Lockset Electronic Bolt Access Control Components Physical Security Integration & Access Control Electronic Lockset Electronic Bolt
  • 27. Exit Devices Request To Exit Crash Bar PIR-RTE Push Button Access Control Components Physical Security Integration & Access Control
  • 28. Credentials Form Badge, Fob, Etc. Type Prox iClass Protocol HID Global NXP Semiconductor Access Control Components Physical Security Integration & Access Control Keyfob Badge Clamshell
  • 29. Authorization Interface Card Reader Ingress/Egress Access Control Components Physical Security Integration & Access Control
  • 30. Authorization Interface Card Readers Wiegand Protocol OSDP Protocol Credentials Standard Proximity Smartcards Barcode/Magstripe Gesture Sensitive Access Control Components Physical Security Integration & Access Control
  • 31. Authorization Interface Keypad Oldest & Most Common Diminished Security Password Protection Shoulder Surfing Access Control Components Physical Security Integration & Access Control
  • 32. Authorization Interface Biometrics Fingerprint Hand Geometry Retinal Scan Iris Scan Facial Recognition Access Control Components Physical Security Integration & Access Control
  • 33. Authorization Factors Visual Verification Multifactor Credentials Possession: Something You Have Knowledge: Something You Know Characteristic: Something You Are Trusted Verification: Someone Trusted Verifies You Access Control Concepts Physical Security Integration & Access Control
  • 34. Authorization Factors Multifactor Credentials 2 Factors – Keyfob & PIN 3 Factors – Keyfob, PIN & Fingerprint 4 Factors – Keyfob, PIN, Fingerprint & Manned Checkpoint Access Control Concepts Physical Security Integration & Access Control
  • 35. Door Controllers Bridge the Gap CAN Controllers Standalone Controllers Integrated Controllers Access Control Components Physical Security Integration & Access Control
  • 36. Transmission & Networks IP-Based Transmission Power over Ethernet (PoE) 802.3af – 15.4W power 802.3at – 25.5W power Access Control Components Physical Security Integration & Access Control
  • 37. Physical Security Integration & Access Control
  • 38. Transmission & Networks Hardwired / Serial Connected Cable Systems 6 Conductor Cable 4 Conductor Cable / 8 Conductor Cable 2 Conductor Cable Drain Wire Access Control Components Physical Security Integration & Access Control
  • 40. Contacts David Martin LENSEC (512) 318-3829 dmartin@lensec.com Keith Harris LENSEC (512) 913-3907 kharris@lensec.com
  • 42. SIS5-16 Webinar – Physical Security Integration & Access Control Part One: Concepts & Components Questions & Answers Poll Question #1 What is the primary concern when regulating access control? 1. Integrating many different building systems 2. Carefully reading the specifications 3. Life safety 4. Knowing who has jurisdiction for code enforcement Poll Question #2 To which side of the door are Fail Safe & Fail Secure relevant? 1. The entry side of the door 2. The exit side of the door 3. Both sides of the door 4. Neither side of the door Which version of the building and fire codes should I follow? That is not always an easy answer. The right thing to do is follow the version of the code that the AHJ follows. This could vary among entities. The most recent version of the NFPA 101 Life Safety Code is 2015, though many jurisdictions are still working off of 2012 rules or earlier. The AHJ has the authority to adopt the code. So, when in doubt, check with the AHJ for clarification. When using a Fail Safe lock, the door becomes unlocked when there is a power failure. How does the owner prevent a security risk? I’ve seen that as a concern before. You can’t auto lock the doors in those situations because that defeats the purpose of life safety. You can provide a mechanical lock and have security or a designated person go and manually lock the doors after an inspection of the building. However, the mechanical lock should be used on a regular basis since free egress should be maintained. Fail Secure hardware locations might require a Mechanical Override Key to manually lock doors for building security when the power is down. Proper use dictates that these keys are only used on an emergency basis and held by a limited number of key holders.
  • 43. How does access control work with building systems like the fire alarm? A fire alarm pull is not an exit device, but it works like one – sort of. The fire alarm is configured to drop lock power when the fire pull is activated. Maglocks and access control systems have contacts to tie into the fire alarm. AHJs may require proof of successful access control override by the fire pulls. When you’re choosing a wireless or WiFi lockset, do each have to be within range of the access point? Range is a consideration. Each location should be tested to make sure it is in range of the network access point. Some of these locks are designed with a MIMO style network for lock communications. This would require a system hub to located within range of every lock. A single system hub might manage 12 or more doors within its range. Are there other types of Request To Exit devices for uncommon installation circumstances? A less common device is an RTE Pressure Pad placed in front of a door to break power when a person stand on it. These work best when installed under carpets or flooring, though this might complicate maintenance. Pressure Pads might be used in areas where hand contact with the door or PIRs are not permitted, such as a clean room or explosive areas.