- Project plans
- Project activities
- Legislation and standards
- Industry context
Last edited 07 Oct 2018
Commercial security systems
For business owners, security can be very important. As well as the security of physical property it is also important to protect equipment, staff, visitors, and information. Security can also be an important consideration on construction sites.
- Access control.
- Intruder alarms.
- Perimeter security.
- Fire detection systems.
- Integrated systems.
- Key cards.
- Access badges.
- Key fobs.
- Video verification.
CCTV systems generally consist of a number of security cameras connected to a central digital video recorder (DVR) or computer by cables such as ethernet cables or via a Wi-Fi signal. Cameras can include features such as:
- Infrared or night vision.
- License plate or facial recognition.
- Automatic motion detectors.
An important consideration when installing a CCTV system is the quality of the recorded footage and the resolution of the cameras. A clear image is required if the footage is to be used in any legal proceedings. One difficulty for large businesses is how to monitor multiple camera feeds in a cost effective manner. Video analytics can help automate CCTV monitoring and analyse footage without the need for additional manpower. Video analytics examines video output for recognisable patterns of movement that might be associated with suspicious behaviour, allowing surveillance to focus on potentially important events.
Disk indexing and time-stamping can make it easier to locate footage.
CCTV images can be transmitted to a remote monitoring facility or can be accessed on remote devices such as mobile phones, allowing responses to be controlled, such as police or fire service action, or in some cases to permit access and de-activate alarms.
Also known as security or burglar alarms, intruder alarms detect unauthorised entry into a site, building, room or secure installation (such as a safe). They can work through a number of sensor types, such as:
- Hermetically sealed switches.
- Passive infra-red motion detectors.
- Photoelectric beam systems.
- Glass break acoustic detectors.
The signals from these sensors are sent back to a central control unit via a wired or wireless network. In high-end installations, these units may be located in a remote facility where staff members can monitor activities, mobilise security personnel or contact the police in an emergency.
Intruder alarm systems may also emit an audible alarm. This serves two purposes: it draws attention to the break-in, and makes it unpleasant for the intruder to remain onsite.
Perimeter security can prevent access onto a property through means such as; walls, fences, infra-red perimeter beams, bollards and so on. At the points of entry, security guards or other access controls may be installed. Gates, barriers, turnstiles, shutters, and screens can be used to close these points outside of business hours. Care must be taken that the property’s exterior is independent from trees, shrubs and other obstacles which could be used to approach the building while hidden from sight.
- Manual pull stations.
- Break glass stations.
- Heat detectors.
- Smoke detectors.
- Magnetic fire doors.
- Evacuation signals and signage.
- Carbon dioxide detectors.
If these systems are operated separately, costs can be higher, decisions poorer, and responses inappropriate. Instead, access controls, alarms, sensors, and responses, can be integrated into one system, sometimes as part of a wider building management system. This can permit greater control, better response and improved flexibility, for example, setting different configurations for weekends, holidays and night time security, turning lights on and off, controlling blinds and controlling cameras.
Systems might operate across a number of sites.
Security assessments can be useful to assess the needs of an organisation and its estate and to determine its weak points. Advice can then be given on which components are necessary to build an effective system that reduces incidents on site. A thorough assessment will also take local crime trends into account when devising a solution.
It is important that security solutions remain up-to-date, reflecting emerging threats and changing business needs, and that systems and procedures are tested and re-assessed regularly.
--Brunel-Security 02:18, 6 February 2015 (UTC)
 Find out more
 Related articles on Designing Buildings Wiki
- Access control.
- Approved document Q.
- Construction phase plan.
- Entry control.
- Fire and rescue service.
- Fire damper.
- Fire detection and alarm system.
- Global overview analysis of fire and security.
- Health and safety.
- How to install an underfloor safe.
- Intruder alarm.
- Joint fire code.
- Outbuildings security.
- Perimeter security.
- Security consultant.
- Smart surveillance, video surveillance and VSaaS.
- Types of alarm.
- Types of lock.
Featured articles and news
What is biophilic design and how can it increase wellbeing?
80 experts come up with the top 7 mistakes the industry makes with BREEAM.
Compliance cannot be verified by inspection on delivery.
Some electric cars have batteries that give a range of over 350 miles.
Assembling, curating, caring for, and designing the future.
A sensitive approach to renovating a building of historic stature.
UK energy policy uncertainty as Welsh project put on hold
What collaborative working achieves and how it can be put in place.
BSRIA publishes the 2019 edition of its small but concise annual databook.
Using QSAND to measure the performance of disaster response.
What U-values are, why they matter and how they are calculated.
The need to ensure that we plan for all aspects of our bio-economy
BSRIA calls on government to reach deeper into the causes of pollution.