SlideShare a Scribd company logo
© 2003 By Default!
A Free sample background from www.powerpointbackgrounds.com
Slide 1
ACCESS CONTROL AT
MAIN GATE
&
OTHER ENTRANCES
Capt SB Tyagi, COAS CC*, FISM, CSP, CSC
© 2003 By Default!
A Free sample background from www.powerpointbackgrounds.com
Slide 2
INTRODUCTION
 SECURITY WOULD BE EASY IF EACH
COMPANY BUILD AN IMPENETRABLE
FORTRESS TO HOUSE THEIR ASSETS AND
NEVER ALLOWED ANYONE INTO THE
FACILITY !!!
 IS IT POSSIBLE? NO ! BECAUSE COMPANIES
NEED TO PRODUCE A PRODUCT OR SERVICE
FOR WHICH PEOPLE ARE NEEDED TO
PERFORM TASKS ON A SCHEDULED BASIS.
 SECURITY MUST PROTECT PERSONNEL AND
ASSETS WHILE ALLOWING THE BUSINESS TO
FUNCTION IN A TIME EFFICIENT MANNER.
© 2003 By Default!
A Free sample background from www.powerpointbackgrounds.com
Slide 3
CHALLENGES FOR SECURITY
PROFESSIONALS
 CHANGE IN SECURITY CONCEPT WORLD
OVER AFTER WTC, USA INCIDENT ON 11
SEPT. 2001
 ESCALATION IN SUICIDE ATTACKS BY
TERRORISTS
 DIMENSION OF SECURITY DRASTICALLY
CHANGED IN INDIA AFTER ATTACK ON
INDIAN PARLIAMENT ON 13 DEC. 2001
© 2003 By Default!
A Free sample background from www.powerpointbackgrounds.com
Slide 4
WHY ACCESS CONTROL
 SECURITY PROFESSIONAL NOW PAY MORE EMPHASIS
ON INTELLIGENCE GATHERING AND PROACTIVE AND
PREVENTIVE SECURITY MANAGEMENT
 THE POTENTIAL COST TO BUSINESS WHEN SECURITY
IS BREACHED CAN WEIGH HEAVILY ON A COMPANY’S
SAFETY, REPUTATION, VIABILITY AND ULTIMATE
PROFITABILITY
 STAFF’S WELL BEING, PRODUCT INTEGRITY, SECRET
PROCESSES, COLLATERAL AND INTELLECTUAL
PROPERTY IS ALL AT GREAT RISK
 ACCESS CONTROL PROVIDES THE ABILITY TO
CONTROL, MONITOR AND RESTRICT THE MOVEMENT
OF PEOPLE, ASSETS OR VEHICLES IN, OUT AND
AROUND A BUILDING OR SITE
© 2003 By Default!
A Free sample background from www.powerpointbackgrounds.com
Slide 5
BENEFITS OF ACCESS CONTROL
 NEED TO
- GO
- KNOW WHO IS IN THE PREMISES
- KNOW WHERE PEOPLE ARE
 RESTRICTION OF MOVEMENT OF MEN,
MATERIAL ETC. WITHIN THE PREMISES
 ACCESS CONTROL PROVIDES
"OWNERS" WITH THE ABILITY TO
PROTECT THEIR PEOPLE, ASSETS AND
INTELLECTUAL PROPERTY
© 2003 By Default!
A Free sample background from www.powerpointbackgrounds.com
Slide 6
Designing of Access Control
 RISK ASSESSEMENT
POINTS TO BE KEPT IN MIND
 TYPE OF INDUSTRY
 TOPOGRAPHY OF AREA
 SECURITY CATEGORY
 NUMBER OF GATES
 LAYER OF SECURITY
 TYPE OF CRIME IN THE AREA
 DISTURBED AREA
 EMPLOYEES
 TYPE OF VEHICLES
© 2003 By Default!
A Free sample background from www.powerpointbackgrounds.com
Slide 7
Designing of Access Control CONTD……
POINTS TO BE KEPT IN MIND
 MANPOWER FOR GATE
 SHELTOR PROVIDED
 PROCEDURE OF ENTRY
 TRAFFIC OF EMPLOYEES, VEHICLE etc.
INTRODUCTION OF SECURITY GADGETS
 BUDGET FOR SECURITY GADGETS
 EASY TO HANDLE SECURITY GADGETS
 SERVICE AVAILABLE FOR GADGETS
 USER FRIENDLY SYSTEM
© 2003 By Default!
A Free sample background from www.powerpointbackgrounds.com
Slide 8
TYPE OF ACCESS CONTROL
 TO LAYERED APPROACH
- WITHOUT MANPOWER
- WITH MANPOWER
 MECHNICAL OR HYDRAULICK BASED
SYSTEM
 STAND ALONE SYSTEM WITH OR
WITHOUT REMOTE
 ON LINE SYSTEM WITH OR WITHOUT
INTEGARATION WITH OTHER SECURITY
GADGETS
© 2003 By Default!
A Free sample background from www.powerpointbackgrounds.com
Slide 9
PRODUCTS AVAILABLE
 TOKEN BASE
 DIGITAL KEYPADS
 BIOMETRIC ACCESS SYSTEM
 AUDIO SYSTEM
 VIDEO SYSTEM
© 2003 By Default!
A Free sample background from www.powerpointbackgrounds.com
Slide 10
INTEGRATION WITH OTHER
SYSTEM
 ALARM MANAGEMENT
 CCTV
 TIME & ATTENDANCE
 BUILDING MANAGEMENT
 GUARD TOUR MANAGEMENT
 INTRUDER ALARM SYSTEM
© 2003 By Default!
A Free sample background from www.powerpointbackgrounds.com
Slide 11
MODEL ENTRANCE GATE FOR
BIG PLANT
 DROP GATE ENTRY FOR KNOWN
PERSONS WITH SEPARATE ENTRY FOR
4-WHEEL, 2-WHEEL AND PADESTRIAN
 SEPARATE SINGLE ENTRY FOR VISITORS
WITH REMOTE CONTROL GATES
 CLEAN DRIVE WAY OF 100MTR WITH
CCTV AND GUARD
 PHYSICAL CHECKING ON REQUIREMENT
BASIS WITH GADGETS TO RESTRICT
FORCED ENTRY
© 2003 By Default!
A Free sample background from www.powerpointbackgrounds.com
Slide 12
International Council of
Security & Safety

More Related Content

What's hot

Behavior Based Safety
Behavior Based Safety Behavior Based Safety
Behavior Based Safety
Surendra Marchande
 
Accident direct cost & indirect cost
Accident direct cost & indirect costAccident direct cost & indirect cost
Accident direct cost & indirect cost
Sachin Patil
 
Health & Safety Induction Training
Health & Safety Induction Training Health & Safety Induction Training
Health & Safety Induction Training
Claire
 
Workplace hazards
Workplace hazardsWorkplace hazards
Workplace hazards
Navneet Maan
 
Forklift and pedestrian safety
Forklift and pedestrian safetyForklift and pedestrian safety
Forklift and pedestrian safety
oscar anell
 
PPT ON PERMIT TO WORK, by Ekemezie E
PPT ON PERMIT TO WORK, by Ekemezie EPPT ON PERMIT TO WORK, by Ekemezie E
PPT ON PERMIT TO WORK, by Ekemezie E
Ekemezie Emeanuwa, NEBOSH, OSHA, ASNT II
 
Ladder Safety
Ladder SafetyLadder Safety
Ladder Safety
Hvacmach
 
Incident investigation
Incident investigationIncident investigation
Incident investigation
aufumy
 
Hot Works Safety Training
Hot Works Safety TrainingHot Works Safety Training
Hot Works Safety Training
Gaurav Singh Rajput
 
Near miss awareness for petroleum oil refinery
Near miss awareness for petroleum oil refineryNear miss awareness for petroleum oil refinery
Near miss awareness for petroleum oil refinery
ASHOK KUMAR SINGH
 
Industrial safety
Industrial safetyIndustrial safety
Industrial safety
Lokesh B N
 
Hearing safety awareness training
Hearing safety awareness trainingHearing safety awareness training
Hearing safety awareness training
kyaw_zin
 
NGI-Permit to Work
NGI-Permit to WorkNGI-Permit to Work
NGI-Permit to Work
lifecombo
 
Accident Investigation-Reporting-Prevention Training by PATHS
Accident Investigation-Reporting-Prevention Training by PATHSAccident Investigation-Reporting-Prevention Training by PATHS
Accident Investigation-Reporting-Prevention Training by PATHS
Atlantic Training, LLC.
 
Confined Space Horizontal Entry And Rescue
Confined Space Horizontal Entry And RescueConfined Space Horizontal Entry And Rescue
Confined Space Horizontal Entry And Rescue
Abfad Limited
 
Safety english hindi-20100331
Safety english hindi-20100331Safety english hindi-20100331
Safety english hindi-20100331
Maninder Bagga
 
Winter Driving Safety
Winter Driving SafetyWinter Driving Safety
Winter Driving Safety
Beamer
 
Behaviour based safety and prevention of accidents in industries
Behaviour based safety and prevention of accidents in industriesBehaviour based safety and prevention of accidents in industries
Behaviour based safety and prevention of accidents in industries
Vudugundla Kodandapani
 
Security t raining for security guard
Security t raining for security guardSecurity t raining for security guard
Security t raining for security guard
Pasilo Drango
 
Behavior-Based Safety PPT Slide Template
Behavior-Based Safety PPT Slide TemplateBehavior-Based Safety PPT Slide Template
Behavior-Based Safety PPT Slide Template
PresentationLoad
 

What's hot (20)

Behavior Based Safety
Behavior Based Safety Behavior Based Safety
Behavior Based Safety
 
Accident direct cost & indirect cost
Accident direct cost & indirect costAccident direct cost & indirect cost
Accident direct cost & indirect cost
 
Health & Safety Induction Training
Health & Safety Induction Training Health & Safety Induction Training
Health & Safety Induction Training
 
Workplace hazards
Workplace hazardsWorkplace hazards
Workplace hazards
 
Forklift and pedestrian safety
Forklift and pedestrian safetyForklift and pedestrian safety
Forklift and pedestrian safety
 
PPT ON PERMIT TO WORK, by Ekemezie E
PPT ON PERMIT TO WORK, by Ekemezie EPPT ON PERMIT TO WORK, by Ekemezie E
PPT ON PERMIT TO WORK, by Ekemezie E
 
Ladder Safety
Ladder SafetyLadder Safety
Ladder Safety
 
Incident investigation
Incident investigationIncident investigation
Incident investigation
 
Hot Works Safety Training
Hot Works Safety TrainingHot Works Safety Training
Hot Works Safety Training
 
Near miss awareness for petroleum oil refinery
Near miss awareness for petroleum oil refineryNear miss awareness for petroleum oil refinery
Near miss awareness for petroleum oil refinery
 
Industrial safety
Industrial safetyIndustrial safety
Industrial safety
 
Hearing safety awareness training
Hearing safety awareness trainingHearing safety awareness training
Hearing safety awareness training
 
NGI-Permit to Work
NGI-Permit to WorkNGI-Permit to Work
NGI-Permit to Work
 
Accident Investigation-Reporting-Prevention Training by PATHS
Accident Investigation-Reporting-Prevention Training by PATHSAccident Investigation-Reporting-Prevention Training by PATHS
Accident Investigation-Reporting-Prevention Training by PATHS
 
Confined Space Horizontal Entry And Rescue
Confined Space Horizontal Entry And RescueConfined Space Horizontal Entry And Rescue
Confined Space Horizontal Entry And Rescue
 
Safety english hindi-20100331
Safety english hindi-20100331Safety english hindi-20100331
Safety english hindi-20100331
 
Winter Driving Safety
Winter Driving SafetyWinter Driving Safety
Winter Driving Safety
 
Behaviour based safety and prevention of accidents in industries
Behaviour based safety and prevention of accidents in industriesBehaviour based safety and prevention of accidents in industries
Behaviour based safety and prevention of accidents in industries
 
Security t raining for security guard
Security t raining for security guardSecurity t raining for security guard
Security t raining for security guard
 
Behavior-Based Safety PPT Slide Template
Behavior-Based Safety PPT Slide TemplateBehavior-Based Safety PPT Slide Template
Behavior-Based Safety PPT Slide Template
 

Viewers also liked

Vehicle Search 101
Vehicle Search 101Vehicle Search 101
Vehicle Search 101
Ben Davila
 
Security training module
Security training moduleSecurity training module
Security training module
pagare_c
 
403 9
403 9403 9
2015-12-08 CTP Update and Assessment
2015-12-08 CTP Update and Assessment2015-12-08 CTP Update and Assessment
2015-12-08 CTP Update and Assessment
AEI's Critical Threats Project
 
Pei mariano santamaria_09
Pei mariano santamaria_09Pei mariano santamaria_09
Pei mariano santamaria_09
I.E.D.MARIANOSANTAMARIA
 
Ied’s(improvised explosive device)wcc
Ied’s(improvised explosive device)wccIed’s(improvised explosive device)wcc
Ied’s(improvised explosive device)wcc
personalprotector
 
Misión y Visión
Misión y VisiónMisión y Visión
Misión y Visión
I.E.D.MARIANOSANTAMARIA
 
Ied vehicle search
Ied vehicle searchIed vehicle search
Ied vehicle search
Mario-Madalena De Sousa
 
Unit3
Unit3Unit3
In-depth IED Awareness Training
In-depth IED Awareness TrainingIn-depth IED Awareness Training
In-depth IED Awareness Training
Chris Fearnley
 
The Role of a Static Security Guard
The Role of a Static Security GuardThe Role of a Static Security Guard
The Role of a Static Security Guard
Amelia White
 
Bomb threat
Bomb threatBomb threat
Bomb threat
MOHAMMED IMRAN
 
Sop for security
Sop for securitySop for security
Sop for security
Ruchi Khanna
 
Sample Methodology
Sample MethodologySample Methodology
Sample Methodology
Aiden Yeh
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
SlideShare
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
SlideShare
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
SlideShare
 

Viewers also liked (17)

Vehicle Search 101
Vehicle Search 101Vehicle Search 101
Vehicle Search 101
 
Security training module
Security training moduleSecurity training module
Security training module
 
403 9
403 9403 9
403 9
 
2015-12-08 CTP Update and Assessment
2015-12-08 CTP Update and Assessment2015-12-08 CTP Update and Assessment
2015-12-08 CTP Update and Assessment
 
Pei mariano santamaria_09
Pei mariano santamaria_09Pei mariano santamaria_09
Pei mariano santamaria_09
 
Ied’s(improvised explosive device)wcc
Ied’s(improvised explosive device)wccIed’s(improvised explosive device)wcc
Ied’s(improvised explosive device)wcc
 
Misión y Visión
Misión y VisiónMisión y Visión
Misión y Visión
 
Ied vehicle search
Ied vehicle searchIed vehicle search
Ied vehicle search
 
Unit3
Unit3Unit3
Unit3
 
In-depth IED Awareness Training
In-depth IED Awareness TrainingIn-depth IED Awareness Training
In-depth IED Awareness Training
 
The Role of a Static Security Guard
The Role of a Static Security GuardThe Role of a Static Security Guard
The Role of a Static Security Guard
 
Bomb threat
Bomb threatBomb threat
Bomb threat
 
Sop for security
Sop for securitySop for security
Sop for security
 
Sample Methodology
Sample MethodologySample Methodology
Sample Methodology
 
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
A Guide to SlideShare Analytics - Excerpts from Hubspot's Step by Step Guide ...
 
How to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & TricksHow to Make Awesome SlideShares: Tips & Tricks
How to Make Awesome SlideShares: Tips & Tricks
 
Getting Started With SlideShare
Getting Started With SlideShareGetting Started With SlideShare
Getting Started With SlideShare
 

Similar to Access control at gates

MITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICSMITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICS
MITRE ATT&CK
 
Common NonStop security hacks and how to avoid them
Common NonStop security hacks and how to avoid themCommon NonStop security hacks and how to avoid them
Common NonStop security hacks and how to avoid them
Greg Swedosh
 
OFFICE 365 SECURITY
OFFICE 365 SECURITYOFFICE 365 SECURITY
OFFICE 365 SECURITY
Sylvain Martinez
 
Why Make The Cloud Switch
Why Make The Cloud SwitchWhy Make The Cloud Switch
Why Make The Cloud Switch
Eddie O’Brien
 
ngscb
ngscbngscb
EMC isilon for -media-and-entertainment-sales-deck
EMC isilon for -media-and-entertainment-sales-deckEMC isilon for -media-and-entertainment-sales-deck
EMC isilon for -media-and-entertainment-sales-deck
solarisyougood
 
ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!
ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!
ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!
ITCamp
 
Cisco Connected Manufacturing
Cisco Connected ManufacturingCisco Connected Manufacturing
Cisco Connected Manufacturing
Franco Ferrario
 
AWS Summit Tel Aviv - Security Keynote
AWS Summit Tel Aviv - Security KeynoteAWS Summit Tel Aviv - Security Keynote
AWS Summit Tel Aviv - Security Keynote
Amazon Web Services
 
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATESENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
Nexgen Technology
 
News letter june 12
News letter june 12News letter june 12
IBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions Roadmap
IBM Security
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
Samuel Kamuli
 
General Version 9 21 09
General Version 9 21 09General Version 9 21 09
General Version 9 21 09
tverbeck
 
The fastest way to protect your know-how
The fastest way to protect your know-howThe fastest way to protect your know-how
The fastest way to protect your know-how
team-WIBU
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy final
OracleIDM
 
Keyrus customer event_20180515_cloudcases - tupa
Keyrus customer event_20180515_cloudcases - tupaKeyrus customer event_20180515_cloudcases - tupa
Keyrus customer event_20180515_cloudcases - tupa
Stefan Leoni
 
ALM for Developing Engineered Systems - Michael Azoff (Ovum) - 14 May 2019
ALM for Developing Engineered Systems - Michael Azoff (Ovum) - 14 May 2019ALM for Developing Engineered Systems - Michael Azoff (Ovum) - 14 May 2019
ALM for Developing Engineered Systems - Michael Azoff (Ovum) - 14 May 2019
Intland Software GmbH
 
VERO SECURITY GROUP, LLC
VERO SECURITY GROUP, LLC VERO SECURITY GROUP, LLC
VERO SECURITY GROUP, LLC
Leonard Watson
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
IP ServerOne
 

Similar to Access control at gates (20)

MITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICSMITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICS
 
Common NonStop security hacks and how to avoid them
Common NonStop security hacks and how to avoid themCommon NonStop security hacks and how to avoid them
Common NonStop security hacks and how to avoid them
 
OFFICE 365 SECURITY
OFFICE 365 SECURITYOFFICE 365 SECURITY
OFFICE 365 SECURITY
 
Why Make The Cloud Switch
Why Make The Cloud SwitchWhy Make The Cloud Switch
Why Make The Cloud Switch
 
ngscb
ngscbngscb
ngscb
 
EMC isilon for -media-and-entertainment-sales-deck
EMC isilon for -media-and-entertainment-sales-deckEMC isilon for -media-and-entertainment-sales-deck
EMC isilon for -media-and-entertainment-sales-deck
 
ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!
ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!
ITCamp 2018 - Tobiasz Koprowski - Secure your data at rest - on demand, now!
 
Cisco Connected Manufacturing
Cisco Connected ManufacturingCisco Connected Manufacturing
Cisco Connected Manufacturing
 
AWS Summit Tel Aviv - Security Keynote
AWS Summit Tel Aviv - Security KeynoteAWS Summit Tel Aviv - Security Keynote
AWS Summit Tel Aviv - Security Keynote
 
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATESENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
ENABLING CLOUD STORAGE AUDITING WITH VERIFIABLE OUTSOURCING OF KEY UPDATES
 
News letter june 12
News letter june 12News letter june 12
News letter june 12
 
IBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions RoadmapIBM Insight 2015 - Security Sessions Roadmap
IBM Insight 2015 - Security Sessions Roadmap
 
Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015Gartner technologies for Infosec 2014-2015
Gartner technologies for Infosec 2014-2015
 
General Version 9 21 09
General Version 9 21 09General Version 9 21 09
General Version 9 21 09
 
The fastest way to protect your know-how
The fastest way to protect your know-howThe fastest way to protect your know-how
The fastest way to protect your know-how
 
Con8808 enabling business growth in the new economy final
Con8808 enabling business growth in the new economy    finalCon8808 enabling business growth in the new economy    final
Con8808 enabling business growth in the new economy final
 
Keyrus customer event_20180515_cloudcases - tupa
Keyrus customer event_20180515_cloudcases - tupaKeyrus customer event_20180515_cloudcases - tupa
Keyrus customer event_20180515_cloudcases - tupa
 
ALM for Developing Engineered Systems - Michael Azoff (Ovum) - 14 May 2019
ALM for Developing Engineered Systems - Michael Azoff (Ovum) - 14 May 2019ALM for Developing Engineered Systems - Michael Azoff (Ovum) - 14 May 2019
ALM for Developing Engineered Systems - Michael Azoff (Ovum) - 14 May 2019
 
VERO SECURITY GROUP, LLC
VERO SECURITY GROUP, LLC VERO SECURITY GROUP, LLC
VERO SECURITY GROUP, LLC
 
Acorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutesAcorn Recovery: Restore IT infra within minutes
Acorn Recovery: Restore IT infra within minutes
 

More from Capt SB Tyagi, COAC'CC*,FISM,CSC,

14 aug
14 aug14 aug
14 july
14 july14 july
14 june
14 june14 june
14 may
14 may14 may
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
Capt SB Tyagi, COAC'CC*,FISM,CSC,
 
ICISS Newsletter Oct14
ICISS Newsletter Oct14ICISS Newsletter Oct14
ICISS Newsletter Oct14
Capt SB Tyagi, COAC'CC*,FISM,CSC,
 
14 nov
14 nov14 nov
ICISS Newsletter April 14
ICISS Newsletter April 14ICISS Newsletter April 14
ICISS Newsletter April 14
Capt SB Tyagi, COAC'CC*,FISM,CSC,
 
ICISS Newsletter March 14
ICISS Newsletter March 14ICISS Newsletter March 14
ICISS Newsletter March 14
Capt SB Tyagi, COAC'CC*,FISM,CSC,
 
ICISS Newsletter Feb 14
ICISS Newsletter Feb 14ICISS Newsletter Feb 14
ICISS Newsletter Feb 14
Capt SB Tyagi, COAC'CC*,FISM,CSC,
 
News letter jan.14
News letter jan.14News letter jan.14
News letter dec.03
News letter dec.03News letter dec.03
News letter oct 13
News letter oct 13News letter oct 13
News letter sept 13
News letter sept 13News letter sept 13
News letter aug 13
News letter aug 13News letter aug 13
News letter july 13
News letter july 13News letter july 13
News letter june 13
News letter june 13News letter june 13
News letter april 13
News letter april 13News letter april 13
News letter april 13
Capt SB Tyagi, COAC'CC*,FISM,CSC,
 
News letter march 13
News letter march 13News letter march 13
News letter march 13
Capt SB Tyagi, COAC'CC*,FISM,CSC,
 
News letter feb 13
News letter feb 13News letter feb 13

More from Capt SB Tyagi, COAC'CC*,FISM,CSC, (20)

14 aug
14 aug14 aug
14 aug
 
14 july
14 july14 july
14 july
 
14 june
14 june14 june
14 june
 
14 may
14 may14 may
14 may
 
ICISS Newsletter Sept 14
ICISS Newsletter Sept 14ICISS Newsletter Sept 14
ICISS Newsletter Sept 14
 
ICISS Newsletter Oct14
ICISS Newsletter Oct14ICISS Newsletter Oct14
ICISS Newsletter Oct14
 
14 nov
14 nov14 nov
14 nov
 
ICISS Newsletter April 14
ICISS Newsletter April 14ICISS Newsletter April 14
ICISS Newsletter April 14
 
ICISS Newsletter March 14
ICISS Newsletter March 14ICISS Newsletter March 14
ICISS Newsletter March 14
 
ICISS Newsletter Feb 14
ICISS Newsletter Feb 14ICISS Newsletter Feb 14
ICISS Newsletter Feb 14
 
News letter jan.14
News letter jan.14News letter jan.14
News letter jan.14
 
News letter dec.03
News letter dec.03News letter dec.03
News letter dec.03
 
News letter oct 13
News letter oct 13News letter oct 13
News letter oct 13
 
News letter sept 13
News letter sept 13News letter sept 13
News letter sept 13
 
News letter aug 13
News letter aug 13News letter aug 13
News letter aug 13
 
News letter july 13
News letter july 13News letter july 13
News letter july 13
 
News letter june 13
News letter june 13News letter june 13
News letter june 13
 
News letter april 13
News letter april 13News letter april 13
News letter april 13
 
News letter march 13
News letter march 13News letter march 13
News letter march 13
 
News letter feb 13
News letter feb 13News letter feb 13
News letter feb 13
 

Access control at gates

  • 1. © 2003 By Default! A Free sample background from www.powerpointbackgrounds.com Slide 1 ACCESS CONTROL AT MAIN GATE & OTHER ENTRANCES Capt SB Tyagi, COAS CC*, FISM, CSP, CSC
  • 2. © 2003 By Default! A Free sample background from www.powerpointbackgrounds.com Slide 2 INTRODUCTION  SECURITY WOULD BE EASY IF EACH COMPANY BUILD AN IMPENETRABLE FORTRESS TO HOUSE THEIR ASSETS AND NEVER ALLOWED ANYONE INTO THE FACILITY !!!  IS IT POSSIBLE? NO ! BECAUSE COMPANIES NEED TO PRODUCE A PRODUCT OR SERVICE FOR WHICH PEOPLE ARE NEEDED TO PERFORM TASKS ON A SCHEDULED BASIS.  SECURITY MUST PROTECT PERSONNEL AND ASSETS WHILE ALLOWING THE BUSINESS TO FUNCTION IN A TIME EFFICIENT MANNER.
  • 3. © 2003 By Default! A Free sample background from www.powerpointbackgrounds.com Slide 3 CHALLENGES FOR SECURITY PROFESSIONALS  CHANGE IN SECURITY CONCEPT WORLD OVER AFTER WTC, USA INCIDENT ON 11 SEPT. 2001  ESCALATION IN SUICIDE ATTACKS BY TERRORISTS  DIMENSION OF SECURITY DRASTICALLY CHANGED IN INDIA AFTER ATTACK ON INDIAN PARLIAMENT ON 13 DEC. 2001
  • 4. © 2003 By Default! A Free sample background from www.powerpointbackgrounds.com Slide 4 WHY ACCESS CONTROL  SECURITY PROFESSIONAL NOW PAY MORE EMPHASIS ON INTELLIGENCE GATHERING AND PROACTIVE AND PREVENTIVE SECURITY MANAGEMENT  THE POTENTIAL COST TO BUSINESS WHEN SECURITY IS BREACHED CAN WEIGH HEAVILY ON A COMPANY’S SAFETY, REPUTATION, VIABILITY AND ULTIMATE PROFITABILITY  STAFF’S WELL BEING, PRODUCT INTEGRITY, SECRET PROCESSES, COLLATERAL AND INTELLECTUAL PROPERTY IS ALL AT GREAT RISK  ACCESS CONTROL PROVIDES THE ABILITY TO CONTROL, MONITOR AND RESTRICT THE MOVEMENT OF PEOPLE, ASSETS OR VEHICLES IN, OUT AND AROUND A BUILDING OR SITE
  • 5. © 2003 By Default! A Free sample background from www.powerpointbackgrounds.com Slide 5 BENEFITS OF ACCESS CONTROL  NEED TO - GO - KNOW WHO IS IN THE PREMISES - KNOW WHERE PEOPLE ARE  RESTRICTION OF MOVEMENT OF MEN, MATERIAL ETC. WITHIN THE PREMISES  ACCESS CONTROL PROVIDES "OWNERS" WITH THE ABILITY TO PROTECT THEIR PEOPLE, ASSETS AND INTELLECTUAL PROPERTY
  • 6. © 2003 By Default! A Free sample background from www.powerpointbackgrounds.com Slide 6 Designing of Access Control  RISK ASSESSEMENT POINTS TO BE KEPT IN MIND  TYPE OF INDUSTRY  TOPOGRAPHY OF AREA  SECURITY CATEGORY  NUMBER OF GATES  LAYER OF SECURITY  TYPE OF CRIME IN THE AREA  DISTURBED AREA  EMPLOYEES  TYPE OF VEHICLES
  • 7. © 2003 By Default! A Free sample background from www.powerpointbackgrounds.com Slide 7 Designing of Access Control CONTD…… POINTS TO BE KEPT IN MIND  MANPOWER FOR GATE  SHELTOR PROVIDED  PROCEDURE OF ENTRY  TRAFFIC OF EMPLOYEES, VEHICLE etc. INTRODUCTION OF SECURITY GADGETS  BUDGET FOR SECURITY GADGETS  EASY TO HANDLE SECURITY GADGETS  SERVICE AVAILABLE FOR GADGETS  USER FRIENDLY SYSTEM
  • 8. © 2003 By Default! A Free sample background from www.powerpointbackgrounds.com Slide 8 TYPE OF ACCESS CONTROL  TO LAYERED APPROACH - WITHOUT MANPOWER - WITH MANPOWER  MECHNICAL OR HYDRAULICK BASED SYSTEM  STAND ALONE SYSTEM WITH OR WITHOUT REMOTE  ON LINE SYSTEM WITH OR WITHOUT INTEGARATION WITH OTHER SECURITY GADGETS
  • 9. © 2003 By Default! A Free sample background from www.powerpointbackgrounds.com Slide 9 PRODUCTS AVAILABLE  TOKEN BASE  DIGITAL KEYPADS  BIOMETRIC ACCESS SYSTEM  AUDIO SYSTEM  VIDEO SYSTEM
  • 10. © 2003 By Default! A Free sample background from www.powerpointbackgrounds.com Slide 10 INTEGRATION WITH OTHER SYSTEM  ALARM MANAGEMENT  CCTV  TIME & ATTENDANCE  BUILDING MANAGEMENT  GUARD TOUR MANAGEMENT  INTRUDER ALARM SYSTEM
  • 11. © 2003 By Default! A Free sample background from www.powerpointbackgrounds.com Slide 11 MODEL ENTRANCE GATE FOR BIG PLANT  DROP GATE ENTRY FOR KNOWN PERSONS WITH SEPARATE ENTRY FOR 4-WHEEL, 2-WHEEL AND PADESTRIAN  SEPARATE SINGLE ENTRY FOR VISITORS WITH REMOTE CONTROL GATES  CLEAN DRIVE WAY OF 100MTR WITH CCTV AND GUARD  PHYSICAL CHECKING ON REQUIREMENT BASIS WITH GADGETS TO RESTRICT FORCED ENTRY
  • 12. © 2003 By Default! A Free sample background from www.powerpointbackgrounds.com Slide 12 International Council of Security & Safety