SlideShare a Scribd company logo
1 of 12
© 2003 By Default!
A Free sample background from www.powerpointbackgrounds.com
Slide 1
ACCESS CONTROL AT
MAIN GATE
&
OTHER ENTRANCES
Capt SB Tyagi, COAS CC*, FISM, CSP, CSC
© 2003 By Default!
A Free sample background from www.powerpointbackgrounds.com
Slide 2
INTRODUCTION
 SECURITY WOULD BE EASY IF EACH
COMPANY BUILD AN IMPENETRABLE
FORTRESS TO HOUSE THEIR ASSETS AND
NEVER ALLOWED ANYONE INTO THE
FACILITY !!!
 IS IT POSSIBLE? NO ! BECAUSE COMPANIES
NEED TO PRODUCE A PRODUCT OR SERVICE
FOR WHICH PEOPLE ARE NEEDED TO
PERFORM TASKS ON A SCHEDULED BASIS.
 SECURITY MUST PROTECT PERSONNEL AND
ASSETS WHILE ALLOWING THE BUSINESS TO
FUNCTION IN A TIME EFFICIENT MANNER.
© 2003 By Default!
A Free sample background from www.powerpointbackgrounds.com
Slide 3
CHALLENGES FOR SECURITY
PROFESSIONALS
 CHANGE IN SECURITY CONCEPT WORLD
OVER AFTER WTC, USA INCIDENT ON 11
SEPT. 2001
 ESCALATION IN SUICIDE ATTACKS BY
TERRORISTS
 DIMENSION OF SECURITY DRASTICALLY
CHANGED IN INDIA AFTER ATTACK ON
INDIAN PARLIAMENT ON 13 DEC. 2001
© 2003 By Default!
A Free sample background from www.powerpointbackgrounds.com
Slide 4
WHY ACCESS CONTROL
 SECURITY PROFESSIONAL NOW PAY MORE EMPHASIS
ON INTELLIGENCE GATHERING AND PROACTIVE AND
PREVENTIVE SECURITY MANAGEMENT
 THE POTENTIAL COST TO BUSINESS WHEN SECURITY
IS BREACHED CAN WEIGH HEAVILY ON A COMPANY’S
SAFETY, REPUTATION, VIABILITY AND ULTIMATE
PROFITABILITY
 STAFF’S WELL BEING, PRODUCT INTEGRITY, SECRET
PROCESSES, COLLATERAL AND INTELLECTUAL
PROPERTY IS ALL AT GREAT RISK
 ACCESS CONTROL PROVIDES THE ABILITY TO
CONTROL, MONITOR AND RESTRICT THE MOVEMENT
OF PEOPLE, ASSETS OR VEHICLES IN, OUT AND
AROUND A BUILDING OR SITE
© 2003 By Default!
A Free sample background from www.powerpointbackgrounds.com
Slide 5
BENEFITS OF ACCESS CONTROL
 NEED TO
- GO
- KNOW WHO IS IN THE PREMISES
- KNOW WHERE PEOPLE ARE
 RESTRICTION OF MOVEMENT OF MEN,
MATERIAL ETC. WITHIN THE PREMISES
 ACCESS CONTROL PROVIDES
"OWNERS" WITH THE ABILITY TO
PROTECT THEIR PEOPLE, ASSETS AND
INTELLECTUAL PROPERTY
© 2003 By Default!
A Free sample background from www.powerpointbackgrounds.com
Slide 6
Designing of Access Control
 RISK ASSESSEMENT
POINTS TO BE KEPT IN MIND
 TYPE OF INDUSTRY
 TOPOGRAPHY OF AREA
 SECURITY CATEGORY
 NUMBER OF GATES
 LAYER OF SECURITY
 TYPE OF CRIME IN THE AREA
 DISTURBED AREA
 EMPLOYEES
 TYPE OF VEHICLES
© 2003 By Default!
A Free sample background from www.powerpointbackgrounds.com
Slide 7
Designing of Access Control CONTD……
POINTS TO BE KEPT IN MIND
 MANPOWER FOR GATE
 SHELTOR PROVIDED
 PROCEDURE OF ENTRY
 TRAFFIC OF EMPLOYEES, VEHICLE etc.
INTRODUCTION OF SECURITY GADGETS
 BUDGET FOR SECURITY GADGETS
 EASY TO HANDLE SECURITY GADGETS
 SERVICE AVAILABLE FOR GADGETS
 USER FRIENDLY SYSTEM
© 2003 By Default!
A Free sample background from www.powerpointbackgrounds.com
Slide 8
TYPE OF ACCESS CONTROL
 TO LAYERED APPROACH
- WITHOUT MANPOWER
- WITH MANPOWER
 MECHNICAL OR HYDRAULICK BASED
SYSTEM
 STAND ALONE SYSTEM WITH OR
WITHOUT REMOTE
 ON LINE SYSTEM WITH OR WITHOUT
INTEGARATION WITH OTHER SECURITY
GADGETS
© 2003 By Default!
A Free sample background from www.powerpointbackgrounds.com
Slide 9
PRODUCTS AVAILABLE
 TOKEN BASE
 DIGITAL KEYPADS
 BIOMETRIC ACCESS SYSTEM
 AUDIO SYSTEM
 VIDEO SYSTEM
© 2003 By Default!
A Free sample background from www.powerpointbackgrounds.com
Slide 10
INTEGRATION WITH OTHER
SYSTEM
 ALARM MANAGEMENT
 CCTV
 TIME & ATTENDANCE
 BUILDING MANAGEMENT
 GUARD TOUR MANAGEMENT
 INTRUDER ALARM SYSTEM
© 2003 By Default!
A Free sample background from www.powerpointbackgrounds.com
Slide 11
MODEL ENTRANCE GATE FOR
BIG PLANT
 DROP GATE ENTRY FOR KNOWN
PERSONS WITH SEPARATE ENTRY FOR
4-WHEEL, 2-WHEEL AND PADESTRIAN
 SEPARATE SINGLE ENTRY FOR VISITORS
WITH REMOTE CONTROL GATES
 CLEAN DRIVE WAY OF 100MTR WITH
CCTV AND GUARD
 PHYSICAL CHECKING ON REQUIREMENT
BASIS WITH GADGETS TO RESTRICT
FORCED ENTRY
© 2003 By Default!
A Free sample background from www.powerpointbackgrounds.com
Slide 12
International Council of
Security & Safety

More Related Content

What's hot (20)

2.5 security officers
2.5 security officers2.5 security officers
2.5 security officers
 
Safety & Security Hotel
Safety &  Security HotelSafety &  Security Hotel
Safety & Security Hotel
 
Close protection
Close protectionClose protection
Close protection
 
What makes a good security guard?
What makes a good security guard?What makes a good security guard?
What makes a good security guard?
 
Visitors SHE Induction Presentation 2016
Visitors SHE Induction Presentation 2016Visitors SHE Induction Presentation 2016
Visitors SHE Induction Presentation 2016
 
Physical Security Presentation
Physical Security PresentationPhysical Security Presentation
Physical Security Presentation
 
2.1 security officers
2.1 security officers2.1 security officers
2.1 security officers
 
How to Increase Near Miss Reporting
How to Increase Near Miss ReportingHow to Increase Near Miss Reporting
How to Increase Near Miss Reporting
 
Security Presentation
Security PresentationSecurity Presentation
Security Presentation
 
Bomb threat
Bomb threatBomb threat
Bomb threat
 
Staff safety hand book
Staff   safety hand bookStaff   safety hand book
Staff safety hand book
 
Unit 6
Unit 6Unit 6
Unit 6
 
An overview on Behavior Based Safety
An overview on Behavior Based SafetyAn overview on Behavior Based Safety
An overview on Behavior Based Safety
 
HSE PRESENTATION
HSE PRESENTATIONHSE PRESENTATION
HSE PRESENTATION
 
Physical Security
Physical SecurityPhysical Security
Physical Security
 
Physical Security Assessments
Physical Security AssessmentsPhysical Security Assessments
Physical Security Assessments
 
BBS Presentation by Uma Mahesh
BBS Presentation by Uma MaheshBBS Presentation by Uma Mahesh
BBS Presentation by Uma Mahesh
 
Safety committee training
Safety committee trainingSafety committee training
Safety committee training
 
Top 10 Qualities Every Excellent Security Guard Should Have
Top 10 Qualities Every Excellent Security Guard Should HaveTop 10 Qualities Every Excellent Security Guard Should Have
Top 10 Qualities Every Excellent Security Guard Should Have
 
BBS TRAINING.pptx
BBS TRAINING.pptxBBS TRAINING.pptx
BBS TRAINING.pptx
 

Viewers also liked

Vehicle Search 101
Vehicle Search 101Vehicle Search 101
Vehicle Search 101Ben Davila
 
Ied’s(improvised explosive device)wcc
Ied’s(improvised explosive device)wccIed’s(improvised explosive device)wcc
Ied’s(improvised explosive device)wccpersonalprotector
 
In-depth IED Awareness Training
In-depth IED Awareness TrainingIn-depth IED Awareness Training
In-depth IED Awareness TrainingChris Fearnley
 
The Role of a Static Security Guard
The Role of a Static Security GuardThe Role of a Static Security Guard
The Role of a Static Security GuardAmelia White
 
Sample Methodology
Sample MethodologySample Methodology
Sample MethodologyAiden Yeh
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...SlideShare
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksSlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShareSlideShare
 

Viewers also liked (15)

Vehicle Search 101
Vehicle Search 101Vehicle Search 101
Vehicle Search 101
 
403 9
403 9403 9
403 9
 
2015-12-08 CTP Update and Assessment
2015-12-08 CTP Update and Assessment2015-12-08 CTP Update and Assessment
2015-12-08 CTP Update and Assessment
 
Pei mariano santamaria_09
Pei mariano santamaria_09Pei mariano santamaria_09
Pei mariano santamaria_09
 
Ied’s(improvised explosive device)wcc
Ied’s(improvised explosive device)wccIed’s(improvised explosive device)wcc
Ied’s(improvised explosive device)wcc
 
Misión y Visión
Misión y VisiónMisión y Visión
Misión y Visión
 
Ied vehicle search
Ied vehicle searchIed vehicle search
Ied vehicle search
 
Unit3
Unit3Unit3
Unit3
 
In-depth IED Awareness Training
In-depth IED Awareness TrainingIn-depth IED Awareness Training
In-depth IED Awareness Training
 
The Role of a Static Security Guard
The Role of a Static Security GuardThe Role of a Static Security Guard
The Role of a Static Security Guard
 
Sop for security
Sop for securitySop for security
Sop for security
 
Sample Methodology
Sample MethodologySample Methodology
Sample Methodology
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 

Similar to Access control at gates

MITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICSMITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICSMITRE ATT&CK
 
Common NonStop security hacks and how to avoid them
Common NonStop security hacks and how to avoid themCommon NonStop security hacks and how to avoid them
Common NonStop security hacks and how to avoid themGreg Swedosh
 
Why Make The Cloud Switch
Why Make The Cloud SwitchWhy Make The Cloud Switch
Why Make The Cloud SwitchEddie O’Brien
 
EMC isilon for -media-and-entertainment-sales-deck
EMC isilon for -media-and-entertainment-sales-deckEMC isilon for -media-and-entertainment-sales-deck
EMC isilon for -media-and-entertainment-sales-decksolarisyougood
 
ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!
ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!
ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!ITCamp
 
Cisco Connected Manufacturing
Cisco Connected ManufacturingCisco Connected Manufacturing
Cisco Connected ManufacturingFranco Ferrario
 
AWS Summit Tel Aviv - Security Keynote
AWS Summit Tel Aviv - Security KeynoteAWS Summit Tel Aviv - Security Keynote
AWS Summit Tel Aviv - Security KeynoteAmazon Web Services
 
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATESENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATESNexgen Technology
 
IBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Security
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Samuel Kamuli
 
General Version 9 21 09
General Version 9 21 09General Version 9 21 09
General Version 9 21 09tverbeck
 
The fastest way to protect your know-how
The fastest way to protect your know-howThe fastest way to protect your know-how
The fastest way to protect your know-howteam-WIBU
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy finalOracleIDM
 
Keyrus customer event_20180515_cloudcases - tupa
Keyrus customer event_20180515_cloudcases - tupaKeyrus customer event_20180515_cloudcases - tupa
Keyrus customer event_20180515_cloudcases - tupaStefan Leoni
 
ALM for Developing Engineered Systems - Michael Azoff (Ovum) - 14 May 2019
ALM for Developing Engineered Systems - Michael Azoff (Ovum) - 14 May 2019ALM for Developing Engineered Systems - Michael Azoff (Ovum) - 14 May 2019
ALM for Developing Engineered Systems - Michael Azoff (Ovum) - 14 May 2019Intland Software GmbH
 
VERO SECURITY GROUP, LLC
VERO SECURITY GROUP, LLC VERO SECURITY GROUP, LLC
VERO SECURITY GROUP, LLC Leonard Watson
 
AWS Security Best Practices, SaaS and Compliance
AWS Security Best Practices, SaaS and ComplianceAWS Security Best Practices, SaaS and Compliance
AWS Security Best Practices, SaaS and ComplianceGaurav "GP" Pal
 

Similar to Access control at gates (20)

MITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICSMITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICS
 
Common NonStop security hacks and how to avoid them
Common NonStop security hacks and how to avoid themCommon NonStop security hacks and how to avoid them
Common NonStop security hacks and how to avoid them
 
OFFICE 365 SECURITY
OFFICE 365 SECURITYOFFICE 365 SECURITY
OFFICE 365 SECURITY
 
Why Make The Cloud Switch
Why Make The Cloud SwitchWhy Make The Cloud Switch
Why Make The Cloud Switch
 
ngscb
ngscbngscb
ngscb
 
EMC isilon for -media-and-entertainment-sales-deck
EMC isilon for -media-and-entertainment-sales-deckEMC isilon for -media-and-entertainment-sales-deck
EMC isilon for -media-and-entertainment-sales-deck
 
ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!
ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!
ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!
 
Cisco Connected Manufacturing
Cisco Connected ManufacturingCisco Connected Manufacturing
Cisco Connected Manufacturing
 
AWS Summit Tel Aviv - Security Keynote
AWS Summit Tel Aviv - Security KeynoteAWS Summit Tel Aviv - Security Keynote
AWS Summit Tel Aviv - Security Keynote
 
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATESENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
 
News letter june 12
News letter june 12News letter june 12
News letter june 12
 
IBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions Roadmap
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
General Version 9 21 09
General Version 9 21 09General Version 9 21 09
General Version 9 21 09
 
The fastest way to protect your know-how
The fastest way to protect your know-howThe fastest way to protect your know-how
The fastest way to protect your know-how
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy final
 
Keyrus customer event_20180515_cloudcases - tupa
Keyrus customer event_20180515_cloudcases - tupaKeyrus customer event_20180515_cloudcases - tupa
Keyrus customer event_20180515_cloudcases - tupa
 
ALM for Developing Engineered Systems - Michael Azoff (Ovum) - 14 May 2019
ALM for Developing Engineered Systems - Michael Azoff (Ovum) - 14 May 2019ALM for Developing Engineered Systems - Michael Azoff (Ovum) - 14 May 2019
ALM for Developing Engineered Systems - Michael Azoff (Ovum) - 14 May 2019
 
VERO SECURITY GROUP, LLC
VERO SECURITY GROUP, LLC VERO SECURITY GROUP, LLC
VERO SECURITY GROUP, LLC
 
AWS Security Best Practices, SaaS and Compliance
AWS Security Best Practices, SaaS and ComplianceAWS Security Best Practices, SaaS and Compliance
AWS Security Best Practices, SaaS and Compliance
 

More from Capt SB Tyagi, COAC'CC*,FISM,CSC, (20)

14 aug
14 aug14 aug
14 aug
 
14 july
14 july14 july
14 july
 
14 june
14 june14 june
14 june
 
14 may
14 may14 may
14 may
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
 
ICISS Newsletter Oct14
ICISS Newsletter Oct14ICISS Newsletter Oct14
ICISS Newsletter Oct14
 
14 nov
14 nov14 nov
14 nov
 
ICISS Newsletter April 14
ICISS Newsletter April 14ICISS Newsletter April 14
ICISS Newsletter April 14
 
ICISS Newsletter March 14
ICISS Newsletter March 14ICISS Newsletter March 14
ICISS Newsletter March 14
 
ICISS Newsletter Feb 14
ICISS Newsletter Feb 14ICISS Newsletter Feb 14
ICISS Newsletter Feb 14
 
News letter jan.14
News letter jan.14News letter jan.14
News letter jan.14
 
News letter dec.03
News letter dec.03News letter dec.03
News letter dec.03
 
News letter oct 13
News letter oct 13News letter oct 13
News letter oct 13
 
News letter sept 13
News letter sept 13News letter sept 13
News letter sept 13
 
News letter aug 13
News letter aug 13News letter aug 13
News letter aug 13
 
News letter july 13
News letter july 13News letter july 13
News letter july 13
 
News letter june 13
News letter june 13News letter june 13
News letter june 13
 
News letter april 13
News letter april 13News letter april 13
News letter april 13
 
News letter march 13
News letter march 13News letter march 13
News letter march 13
 
News letter feb 13
News letter feb 13News letter feb 13
News letter feb 13
 

Access control at gates

  • 1. © 2003 By Default! A Free sample background from www.powerpointbackgrounds.com Slide 1 ACCESS CONTROL AT MAIN GATE & OTHER ENTRANCES Capt SB Tyagi, COAS CC*, FISM, CSP, CSC
  • 2. © 2003 By Default! A Free sample background from www.powerpointbackgrounds.com Slide 2 INTRODUCTION  SECURITY WOULD BE EASY IF EACH COMPANY BUILD AN IMPENETRABLE FORTRESS TO HOUSE THEIR ASSETS AND NEVER ALLOWED ANYONE INTO THE FACILITY !!!  IS IT POSSIBLE? NO ! BECAUSE COMPANIES NEED TO PRODUCE A PRODUCT OR SERVICE FOR WHICH PEOPLE ARE NEEDED TO PERFORM TASKS ON A SCHEDULED BASIS.  SECURITY MUST PROTECT PERSONNEL AND ASSETS WHILE ALLOWING THE BUSINESS TO FUNCTION IN A TIME EFFICIENT MANNER.
  • 3. © 2003 By Default! A Free sample background from www.powerpointbackgrounds.com Slide 3 CHALLENGES FOR SECURITY PROFESSIONALS  CHANGE IN SECURITY CONCEPT WORLD OVER AFTER WTC, USA INCIDENT ON 11 SEPT. 2001  ESCALATION IN SUICIDE ATTACKS BY TERRORISTS  DIMENSION OF SECURITY DRASTICALLY CHANGED IN INDIA AFTER ATTACK ON INDIAN PARLIAMENT ON 13 DEC. 2001
  • 4. © 2003 By Default! A Free sample background from www.powerpointbackgrounds.com Slide 4 WHY ACCESS CONTROL  SECURITY PROFESSIONAL NOW PAY MORE EMPHASIS ON INTELLIGENCE GATHERING AND PROACTIVE AND PREVENTIVE SECURITY MANAGEMENT  THE POTENTIAL COST TO BUSINESS WHEN SECURITY IS BREACHED CAN WEIGH HEAVILY ON A COMPANY’S SAFETY, REPUTATION, VIABILITY AND ULTIMATE PROFITABILITY  STAFF’S WELL BEING, PRODUCT INTEGRITY, SECRET PROCESSES, COLLATERAL AND INTELLECTUAL PROPERTY IS ALL AT GREAT RISK  ACCESS CONTROL PROVIDES THE ABILITY TO CONTROL, MONITOR AND RESTRICT THE MOVEMENT OF PEOPLE, ASSETS OR VEHICLES IN, OUT AND AROUND A BUILDING OR SITE
  • 5. © 2003 By Default! A Free sample background from www.powerpointbackgrounds.com Slide 5 BENEFITS OF ACCESS CONTROL  NEED TO - GO - KNOW WHO IS IN THE PREMISES - KNOW WHERE PEOPLE ARE  RESTRICTION OF MOVEMENT OF MEN, MATERIAL ETC. WITHIN THE PREMISES  ACCESS CONTROL PROVIDES "OWNERS" WITH THE ABILITY TO PROTECT THEIR PEOPLE, ASSETS AND INTELLECTUAL PROPERTY
  • 6. © 2003 By Default! A Free sample background from www.powerpointbackgrounds.com Slide 6 Designing of Access Control  RISK ASSESSEMENT POINTS TO BE KEPT IN MIND  TYPE OF INDUSTRY  TOPOGRAPHY OF AREA  SECURITY CATEGORY  NUMBER OF GATES  LAYER OF SECURITY  TYPE OF CRIME IN THE AREA  DISTURBED AREA  EMPLOYEES  TYPE OF VEHICLES
  • 7. © 2003 By Default! A Free sample background from www.powerpointbackgrounds.com Slide 7 Designing of Access Control CONTD…… POINTS TO BE KEPT IN MIND  MANPOWER FOR GATE  SHELTOR PROVIDED  PROCEDURE OF ENTRY  TRAFFIC OF EMPLOYEES, VEHICLE etc. INTRODUCTION OF SECURITY GADGETS  BUDGET FOR SECURITY GADGETS  EASY TO HANDLE SECURITY GADGETS  SERVICE AVAILABLE FOR GADGETS  USER FRIENDLY SYSTEM
  • 8. © 2003 By Default! A Free sample background from www.powerpointbackgrounds.com Slide 8 TYPE OF ACCESS CONTROL  TO LAYERED APPROACH - WITHOUT MANPOWER - WITH MANPOWER  MECHNICAL OR HYDRAULICK BASED SYSTEM  STAND ALONE SYSTEM WITH OR WITHOUT REMOTE  ON LINE SYSTEM WITH OR WITHOUT INTEGARATION WITH OTHER SECURITY GADGETS
  • 9. © 2003 By Default! A Free sample background from www.powerpointbackgrounds.com Slide 9 PRODUCTS AVAILABLE  TOKEN BASE  DIGITAL KEYPADS  BIOMETRIC ACCESS SYSTEM  AUDIO SYSTEM  VIDEO SYSTEM
  • 10. © 2003 By Default! A Free sample background from www.powerpointbackgrounds.com Slide 10 INTEGRATION WITH OTHER SYSTEM  ALARM MANAGEMENT  CCTV  TIME & ATTENDANCE  BUILDING MANAGEMENT  GUARD TOUR MANAGEMENT  INTRUDER ALARM SYSTEM
  • 11. © 2003 By Default! A Free sample background from www.powerpointbackgrounds.com Slide 11 MODEL ENTRANCE GATE FOR BIG PLANT  DROP GATE ENTRY FOR KNOWN PERSONS WITH SEPARATE ENTRY FOR 4-WHEEL, 2-WHEEL AND PADESTRIAN  SEPARATE SINGLE ENTRY FOR VISITORS WITH REMOTE CONTROL GATES  CLEAN DRIVE WAY OF 100MTR WITH CCTV AND GUARD  PHYSICAL CHECKING ON REQUIREMENT BASIS WITH GADGETS TO RESTRICT FORCED ENTRY
  • 12. © 2003 By Default! A Free sample background from www.powerpointbackgrounds.com Slide 12 International Council of Security & Safety