Last edited 18 May 2021

Commercial security systems


[edit] Introduction

For business owners, security can be very important. As well as the security of physical property it is also important to protect equipment, staff, visitors, and information. Security can also be an important consideration on construction sites.

The components of a commercial security system might include:

[edit] Access control

Access control permits access by authorised personnel to a site, building, room or other secure installation. Electronic access control systems may allow access using credentials such as:

  • Passcodes.
  • PINs.
  • Key cards.
  • Access badges.
  • Fingerprints.
  • Keys.
  • Key fobs.
  • Video verification.

Access information can be transmitted to a centralised access system where it can be compared to a database of authorised personnel.

[edit] CCTV (closed-circuit TV) systems

CCTV systems generally consist of a number of security cameras connected to a central digital video recorder (DVR) or computer by cables such as ethernet cables or via a Wi-Fi signal. Cameras can include features such as:

An important consideration when installing a CCTV system is the quality of the recorded footage and the resolution of the cameras. A clear image is required if the footage is to be used in any legal proceedings. One difficulty for large businesses is how to monitor multiple camera feeds in a cost effective manner. Video analytics can help automate CCTV monitoring and analyse footage without the need for additional manpower. Video analytics examines video output for recognisable patterns of movement that might be associated with suspicious behaviour, allowing surveillance to focus on potentially important events.

Disk indexing and time-stamping can make it easier to locate footage.

CCTV images can be transmitted to a remote monitoring facility or can be accessed on remote devices such as mobile phones, allowing responses to be controlled, such as police or fire service action, or in some cases to permit access and de-activate alarms.

[edit] Intruder alarms

Also known as security or burglar alarms, intruder alarms detect unauthorised entry into a site, building, room or secure installation (such as a safe). They can work through a number of sensor types, such as:

The signals from these sensors are sent back to a central control unit via a wired or wireless network. In high-end installations, these units may be located in a remote facility where staff members can monitor activities, mobilise security personnel or contact the police in an emergency.

Intruder alarm systems may also emit an audible alarm. This serves two purposes: it draws attention to the break-in, and makes it unpleasant for the intruder to remain onsite.

[edit] Perimeter security

Perimeter security can prevent access onto a property through means such as; walls, fences, infra-red perimeter beams, bollards and so on. At the points of entry, security guards or other access controls may be installed. Gates, barriers, turnstiles, shutters, and screens can be used to close these points outside of business hours. Care must be taken that the property’s exterior is independent from trees, shrubs and other obstacles which could be used to approach the building while hidden from sight.

[edit] Fire detection systems

A fire detection system can consist of a number of components, including:

As with intruder alarms, fire detection systems can include remote monitoring.

[edit] Integrated systems

If these systems are operated separately, costs can be higher, decisions poorer, and responses inappropriate. Instead, access controls, alarms, sensors, and responses, can be integrated into one system, sometimes as part of a wider building management system. This can permit greater control, better response and improved flexibility, for example, setting different configurations for weekends, holidays and night time security, turning lights on and off, controlling blinds and controlling cameras.

Systems might operate across a number of sites.

[edit] Security assessments

Security assessments can be useful to assess the needs of an organisation and its estate and to determine its weak points. Advice can then be given on which components are necessary to build an effective system that reduces incidents on site. A thorough assessment will also take local crime trends into account when devising a solution.

It is important that security solutions remain up-to-date, reflecting emerging threats and changing business needs, and that systems and procedures are tested and re-assessed regularly.

--Brunel-Security 02:18, 6 February 2015 (UTC)

[edit] Related articles on Designing Buildings Wiki


To create a pdf of any articles on this site, just print to pdf.

Designing Buildings Anywhere

Get the Firefox add-on to access 20,000 definitions direct from any website

Find out more Accept cookies and
don't show me this again