Your remote sites are vulnerable. This is especially true if you have an isolated and unmanned site with unsupervised workers coming and going all the time and propping open doors - because they might end up forgetting to close them.
This turns your remote sites into an easy prey for thieves and vandals (animals and bad weather are not excluded either).
Unfortunately, the traditional ways to control remote access, such as a lock-and-key system, are neither practical nor cheap.
Keys can be lost, stolen, or copied and are difficult to keep track of.
Let's take a look at how you can effectively manage site access and prevent risks from propped doors open without blowing a hole in your budget.
A Building Access System (BAS) is a comprehensive building management system that integrates into an existing alarm management platform. With the system in place, a log of all site access, including the time of day and location that access was granted, is maintained. In addition, alarms such as intrusions and excessive access attempts are reported to T/Mon on a per-door basis.
The BAS system provides valuable security to your remote sites and deters theft, break-ins and vandalism. And the system consists of:
A master station
An Entry Control Unit
And a Proxy Reader
The BAS works as a software module in T/MonXM software. It assigns each user with a unique user profile containing information such as which sites are allowed to be accessed, the door numbers, days of the week access is allowed, a start/stop time, and a beginning and ending date (primarily for contractors, new employees, or short term employees).
There is also theT/Mon BAS. T/Mon BAS gives you centralized, electronic control over your doors.
You can use T/Mon BAS to:
Grant individual door access rights for up to 1,300 users
View and control access from all of your facilities on one screen
Monitor unauthorized door access attempts and intrusion alarms
Remotely "buzz-in" site visitors from your central office
Maintain access history logs for review after an incident
T/Mon BAS gives you the advanced access control capabilities of T/Mon LNX, without network alarm monitoring functions you may not need.
The NetGuardian 832A controls local access at your remote sites. This unit maintains a list of personnel who are authorized to access the facility. It records all valid entries, attempts, and the time of each action in non-volatile RAM. It can also receive a control from T/Mon to remotely open a door.
The NetGuardian indicates conditions such as valid entry, invalid access attempt, and system lockout. The unit supports up to 1,300 user profiles for distribution between door entry points.
The Entry Control Unit, or simply ECU, acts as an interface between the NetGuardian and the proxy reader. Any access code that's entered is accepted by the ECU and passed on to the NetGuardian for validation.
A proximity card reader eliminates the chance of forgotten keycodes and increases your level of access control. An employee can easily share a keycode with others, but not a proxy card.
In the event that a card is lost or stolen, it can be deactivated in seconds and a new card may be issued in its place.
You may not care about a typical door-open alarm during business hours, but a door that's propped for more than 3 minutes is a potential threat you must know about.
So, if your main concern is a door propped alarm or door propped open alarm, you can set your BAS' Derived Alarm timer at about 30 seconds to throw alarms after "Door Open" has been standing for 30 seconds straight, for example.
There are some cases, however, when you may want to allow a door to remain unlocked or open. The BAS propped door features allow you to accommodate special access needs at your site.
We've put together the How to Deploy an advanced Building Access System White Paper to answer any other questions about remote site access and remote monitoring.
Get your free copy of the White Paper today to know more about how you can protect your revenue through site monitoring.
There is no other network on the planet that is exactly like yours. For that reason, you need to build a monitoring system that's the right fit for you.
"Buying more than you need" and "buying less than you need" are real risks. You also have to think about training, tech support, and upgrade availability.
Send me a quick online message about what you're trying to accomplish. I'll work with you to build custom PDF application diagram that a perfect fit for your network.
Don't make a bad decision
Your network isn't off-the-shelf.
Your monitoring system shouldn't be, either.
We'll walk you through this with a customized monitoring diagram.
Just tell us what you're trying to accomplish with remote monitoring.Get Your Custom Diagram Now