At Bavaria, hospitality is firmly embedded within the company’s corporate culture and the company attaches considerable importance to the concepts of emotion and the experience. As a result of the growth that the company has undergone during the past few years, more stringent requirements are being imposed in connection with access control and security.

The system that the company has just acquired serves to reconcile the corporate culture with the requirements in terms of security. As a visitor drives up, the barrier at the entrance to the car park is raised without a hitch. Visitors can then report to the friendly receptionist. It is only at that point that they will be confronted with the first type of access control, when the receptionist asks them to register at the visitor registration post in the lobby.

Phased registration of visitors

Part of the registration procedure involves reading a number of safety and security rules. Once the user has read these, his/her visitor’s badge will be printed and the person with whom the visitor has an appointment will be informed.

Our vision with regard to access control is that a visitor should not be faced with a tall fence on arrival"

“Our vision with regard to access control is that a visitor should not be faced with a tall fence on arrival, but that the barrier should automatically be raised when he/she arrives. We do, of course, wish to know who is coming in and where on our site a particular person is located.” These words were spoken by Jos Senden, the Facility Manager at Bavaria, who is responsible for security.

From what he tell us about how security at Bavaria was organised until just a few years ago, it soon becomes clear that this vision was only implemented recently.

Improving security processes

“At the entrance, there were a few security cameras and a fairly unstructured system of recording visitors.” And yet at the time, the company was undergoing a period of rapid national and international growth, as a result of which the necessary expansions took place at the company’s headquarters in Lieshout in the province of North Brabant and the organisational requirements in terms of security changed.

As Jos Senden went on to explain: “But you could say that in those days, security policy did not keep pace with the growth of the organisation itself.” An example of this lay in the fact that at a particular moment, two access control systems were actually in use. What is more, Bavaria was increasingly being required to complete audits for major customers and those audits included questions regarding access control and security.

Determining a security policy

Improving the company’s security processes was therefore essential and there was an increasing feeling that a structured security policy should be put in place. In 2009, the fact that the company was operating two different access control systems became such a problem that a project group was created to address the issue.

We immediately embarked on a search for solutions, but we soon realised that what we needed was a security policy"

“In the beginning, we immediately embarked on a search for solutions, but we soon realised that what we needed was a security policy. After all, a policy is a foundation that you can build upon,” said John Aalders, the IT System and Network Controller, who was involved in the project right from the start. He went on to explain that: “We first drew up a list of the risks that we wished to protect ourselves against and once we had done that, we used that information in order to establish a system of zones across the entire site.”

Security policy plan

“The underlying principle behind this was that we did not wish to create something that resembled Fort Knox. Our aim was to project an image of openness and hospitality, while maintaining security at the same time.” As Jos Senden went on to add: “At Bavaria, being hospitable and open is part of our company culture. A brewery is all about emotion and the experience and this was something that needed to be reflected in our access control and security systems.”

In 2012, the security policy plan, based upon all of the risks that had been defined, together with the zoning system that had been introduced, was adopted. The project team, which included representatives of the Facility, IT and Engineering departments, the company’s own construction office, an external consultant and the company’s own installer, could then set out to identify a suitable solution.

New access control and security system

All of these things represented needs that we had and were what led us to choose AEOS by Nedap"

The Specifications listed a large number of requirements that the new access control and security system would be required to fulfil. However, Senden frankly admits that a number of requirements were only included as the project went along. “We can say that our insight developed progressively, especially with regard to the possibilities to create a security platform that is ready to meet the needs that arise in the future. What is needed is therefore a system that is scalable, user-friendly, can be linked to other management systems, is IP-based and so on."

"All of these things represented needs that we had and were what led us to choose AEOS by Nedap.” In the meantime, the new access control system has been up and running for 18 months and for Senden, the most important conclusion that can be drawn is that AEOS was the right choice for them.

Zero technical limitations

“The flexibility of the system in particular is ideal. Our company processes are easy to incorporate; the system supports this and as an organisation, we are not confronted with any technical limitations.”

John Aalders was able to give a great example of this. “Our initial requirement was for a new access control system, but along the way, we decided that we also needed camera monitoring and an intruder detection system. And recently, the question arose within the organisation as to whether the system could be linked to other building management systems. We have now progressed so far that we are now talking about a graphical interface, known as the Graphical Alarm Handler. All incident reports are received at a central location and can be dealt with by Security.”

In the enthusiastic account conveyed by Jos Senden and John Aalders, one particular word - flexibility - comes up again and again.

Easy to produce visitor’s badge

We haven’t started to record details of vehicles, but it will be a question of setting up the system whenever any such need arises"

When asked whether this was the primary factor behind the ultimate choice of the system, the answer was “Yes”. As Senden himself explained: “Not only does this system make it very easy to produce a visitor’s badge, but its ability to be expanded and the simplicity with which the system can be linked to other packages, formed important factors for us.”

Aalders went on to illustrate this by giving a practical example. “All manner of information is stored within a whole variety of systems. Imagine that I change my job title tomorrow, the new title will simply be entered into the personnel information system and will be processed automatically in our central employee database. This is linked to AEOS, and so the master data that relate to me are immediately amended to show my new position.”

Single open platform

“But we mustn’t lose sight of our needs in the future. At the moment, we haven’t started to record details of vehicles, but it will be a question of setting up the system whenever any such need arises,” explained Senden.

Each of these situations is an example that illustrates the fact that the system fulfils Bavaria’s initial requirement that as many tasks as possible can be carried out centrally, using a single open platform. In order to utilise the system in the most efficient possible way, managing it correctly will also be essential, continued Senden. “With that in mind, we set up a Management group that meets every two weeks in order to share experiences and discuss ongoing matters.” The Management group is made up of representatives of all of the interested departments.

Implementation of new access control system

This in itself underlines the fact that access control and security are a joint responsibility and that they are not simply the concern of the Facility and Security department. “As a result of this, issues can now be addressed in a structured manner and management is a continuous process, in which all interested parties are represented.”

We made sure that we communicated messages via our intranet and our staff magazine about the changes"

In a great many organisations, the implementation of a new access control system generates resistance. How was this perceived at Bavaria? As Senden himself explained: “If you switch from a system with 50 card-readers to a system with 140 and security measures are introduced at all doorways, you can certainly expect to encounter a certain amount of resistance. In order to address this, we made sure that during the run-up to the implementation, we communicated messages via our intranet and our staff magazine about the changes and explained why the systems were being introduced.

Enabled to engender support

During the planning stages of the project, however, we also involved department managers and asked them which areas they wished to be secured or which needed to remain accessible. Adopting this approach enabled us to engender support for the changes to come.”

“But the information was also well received by the employees themselves. Informing people effectively and in good time is therefore something that is highly important. That is why we didn’t experience very many problems,” concluded Aalders.

Share with LinkedIn Share with Twitter Share with Facebook Share with Facebook
Download PDF version Download PDF version

In case you missed it

AI in security: The crystal ball you’ve been waiting for
AI in security: The crystal ball you’ve been waiting for

One of the biggest trends in security and technology today is centered around solutions that take advantage of the wealth of connected security systems and devices powering the organisations all over the world. As the number of cloud-powered systems and sensors have massively grown in recent years, security leaders in the private and public sectors have started to look at ways to leverage the data from these devices to better the lives of employees, customers, and residents. But while the dream of creating a smarter, safer environment remains the top priority for organisations throughout the world especially as they continue to face the ramifications of the COVID-19 pandemic, a myriad of factors hold security leaders back from implementing more advanced technologies across their infrastructures. AI as a disruptor of physical security One of the main reasons being that the advent of these cloud based technologies indubitably generate massive amounts of data that hamper any practical use by security professionals and often times create cognitive overload and paralysis by analysis. A myriad of factors hold security leaders back from implementing more advanced technologies across their infrastructures Organisations face the challenge of trying to answer numerous questions using the big data generated by the various systems and technologies. How are they going to handle the influx of information that all these disparate systems generate? How can it be analysed to extract any useful information or insight? What IT security controls are put in place to safeguard the data? How can the data be effectively curated and funneled to the right people at the right time? How can we make our security footprint be more proactive rather than constantly reactive? The answer is artificial intelligence. AI is undoubtedly one of the bigger disrupters in the physical security industry and adoption is growing at a rapid rate. And it’s not just about video analytics. Rather, it is data AI, which is completely untapped by the security industry. Improving your competitive advantage Today, all divisions of an enterprise are trying to leverage AI and big data to improve their competitive advantage and bottom line, including accounting, sales and marketing, material sourcing, and research and development. We need to ensure that the physical security industry realises they can significantly benefit from better, faster, and more accurate intelligence from the now unstructured, bottomless silos of security data; only then will this result in positioning physical security from a primarily reactive business to a revolutionary new proactive environment. AI is undoubtedly one of the bigger disrupters in the physical security industry and adoption is growing at a rapid rate As an industry, we need to focus on reinventing how security personnel and safety resources are allocated in the public safety and corporate security industry. And it all has to start with intelligence derived from big data using AI. Security leaders in the physical security and law enforcement industry can combine multiple data sources with predictive and prescriptive analytics and artificial intelligence to inform and dynamically deploy personnel, assets, and technologies. This approach drives automation of their current manual processes to maximise the effectiveness and efficiency of their entire security operations. Intelligently predicting the future? Bottom line: AI can change up your security game by automatically deciphering information to predict the future using a wide range of sources and data that have been collected, whether past, present, and future. That’s right; you can look into the future. By grabbing a hold of this AI-powered crystal ball, decision-makers can perform long-term strategic planning and informed day-to-day operational decision making. And what’s more, AI powered platforms are software-based, often delivered using as-a-service business models that empower security personnel to go beyond traditional static business intelligence visualisation and reporting systems to transformative dynamic, predictive and prescriptive decision-making environments. Today’s platforms are also not your traditional, old school, expensive PSIMs; they are cost-effective, configurable to your needs and dare we say, easy to operate. Every security leader I have spoken with lately want to extend AI to their security programs. They don't always know precisely where AI will fit, but they understand the need to operationalise more of their security practices. The overall why is that we should all work collaboratively to help organisations across the globe leverage the tools available to transition away from a reactive stance and gain informed insight into the future where we are truly prepared for and one step ahead of what is coming down the road.

Building security: How audio tells the whole story
Building security: How audio tells the whole story

Every building starts with the entrance. A solid enterprise risk mitigation and security strategy include protecting that entrance. Often, risk mitigation strategies protecting the entrance have included high-resolution video surveillance cameras, video management systems, and access control solutions. But that strategy and set of security solutions only tells part of the story. Imagine a security guard who is protecting a facility after hours, when an individual approaches the entrance and seeks to gain access. The security guard can pull up the video surveillance feed and see the individual and his movements, which appear to be suspicious. But he also needs to hear him in order to decide the next decisions and actions. Does he escalate the situation, calling for backup and for first responders’ response, or does he allow the individual access to the building because he works there and is authorised to enter?   Meet high-definition voice What the security guard needs is to be able to hear and to communicate with that individual. All enterprise security systems need three primary components in order to successfully protect the entrance and to mitigate risk – access control, video surveillance, and the ability to hear and communicate. Each component plays an integral role in supporting a unified security system, and without all three, the security system is not complete. Access control can be thought of as the brains of a security system by holding data and permissions. It serves as the arms and hands of the system; it can either keep someone out or What a security guard needs is to be able to hear and to communicate with an individualinvite them in. IP video allows a security team to remotely position a set of eyes anywhere an IP camera can be placed on a network. With a video management system, security teams can see what is happening and decide how to respond. However, with remote viewing, the event may be over by the time security physically responds.  Audio adds interactivity That three-component enterprise security system – comprising IP video, access control, and high-definition voice working together mitigates risks and provides value. It also means that security is interactive. Security teams talk and listen to the person that’s seen on a video surveillance system, no matter where the location or how remote. If the person is lost or simply needs assistance, security personnel can talk to them and provide direction and reassurance. Even more, in an emergency, an interactive solution becomes a critical life-saving tool, as it provides data that can be shared between security, police, emergency services, and more. Audio can also detect voices, noises, breaking glass, or other sounds that are not within direct view of a video camera. An interactive security system creates an informed response, by providing real-time situation awareness management. Post-event, it supports forensics and investigations to mitigate future security incidents.  Audio and COVID-19 We are living in extraordinary times. As businesses begin to reopen and stay open, they are looking for any tools that can help them overcome the enormous That three-component enterprise security system – comprising IP video, access control, and high-definition voice working together mitigates risks and provides valuechallenges they face. In buildings and facilities, the COVID-19 pandemic has created a new security perimeter, one that demands contactless access with entry and exit, and that has also created a new duty of care for security professionals. Now more than ever is the need to interact and communicate with individuals moving in and out of doors and spaces without physical intervention. Intelligent communications, integrated with contactless access control, can help a business to comply with pandemic safety guidelines and ultimately, reopen for business and stay open.  COVID-19 has also increased the need for clean-room isolation and quarantine spaces, sometimes in areas not originally intended for that use, where risk of infection is high, and equipment must be easily disinfected between patients. Here, purpose-built cleanroom intercoms, providing clear touchless communications despite the noisy environment, have emerged as critical tools for enabling patient care while reducing the need to enter the contaminated space. For example, voice communication can enable hospital staff to verify identity and to communicate with patients without entering the isolated and infectious environment, which can save on personal protective equipment (PPE) and reduce the amount of exposure to the virus. In non-emergency healthcare facilities, such as medical centers, voice can effectively relay information to building occupants and visitors for screening purposes. Visitors can be seen and heard. For example, a patient who seeks access to a medical center for an appointment can hear important instructions from a nurse via the intercom solution. Seeing the person that you talk to is one thing but hearing them conveys a much better sense of closeness, making it possible to maintain a high level of security and customer service.  The whole story Today’s security systems should no longer simply involve video surveillance cameras generating feedback and images to a security guard. Instead, a new ecosystem for enterprise security and risk mitigation has emerged, and it’s one that involves video surveillance, access control, and high-definition voice. That ecosystem can ensure well-rounded and responsive information management and security platform, all communicating with each other and offering actionable insight into risks and potential physical breaches. Audio is the new value hub of the connected and intelligent school, campus, building, correctional facility, and more. Simply put, a silent security system cannot be an effective security system. In every situation, it is crucial for all security professionals to mitigate risk, no matter what they are protecting. This emphasizes the need to hear, be heard, and be understood in virtually any environment.  

How thermal technologies improve facility security and workforce safety
How thermal technologies improve facility security and workforce safety

Blind spots in surveillance coverage, incompatible video and access control systems, lack of adequate perimeter measures—these are common issues that facility directors must address with their security teams. At the end of the day, facility executives need technology that accomplish more with less—that expand situational awareness, overall system functionality, and real-time response capabilities while generating cost-savings. By leveraging technology like thermal imaging, this is possible. Security directors who want to improve facility management—specifically 24/7 monitoring for heightened security and elevated skin temperature frontline screening for entry control—should consider incorporating thermal cameras into their next security upgrade or new installation project.  Levelling up your security with thermal By using thermal security cameras, facility directors can better protect their property and tenants from external threats. Backed by decades of successful deployment in the government and defense sector for reconnaissance, thermal imaging is a trusted technology. New innovations have expanded the use cases for thermal cameras and made them widely available to commercial and industrial facilities. Today, corporate offices, manufacturing plants and healthcare campuses all use thermal cameras as a core component of their security strategy. All use thermal cameras as a core component of their security strategy Thermal security cameras perform in adverse conditions where standard surveillance cameras cannot. Visual cameras require a light source, and thus, additional infrastructure, to produce an image. If there’s no light, there’s no video. Because thermal cameras measure infrared radiation, or heat, they do not need illumination to produce imagery. In fact, thermal cameras can see in total darkness as well as in rain, smoke, and light fog. They truly enable 24/7 surveillance. Enhancing video analytics Further, thermal cameras yield high-contrast imagery, which not only enhances video analytics performance, but also situational awareness. For example, a security operator viewing a thermal camera feed can easily spot a trespasser attempting to camouflage in the foliage at night by alerting the operator of body heat on premise. Thermal cameras also enable alarm validation. While motion sensors, laser detectors and fiber optic cables need another technology to visually verify the alert, thermal cameras already provide this function. With onboard analytics, thermal cameras detect objects, classify whether it’s a human, animal or vehicle, and provide video clips for remote operators to assess the alert. Consequently, thermal cameras minimise unnecessary dispatch of guards or police for false positives, saving valuable time, money and resource for facilities. In the event of a true alarm, thermal cameras enable superior suspect tracking. Upon receiving an intrusion alert, a long-range pan-tilt thermal camera can widely monitor the area and scan the property. The camera can then follow the movements of an intruder, and if equipped with both thermal and optical sensors, provide both thermal and color video of the person. With this data, a security officer can ascertain the threat level and determine whether the person is an employee who forgot their ID or an unauthorised person trespassing on private property. It is important to note that thermal cameras cannot detect a specific individual or their personal information, rather they classify whether the object is a human and then further analysis is required through of the use of visual cameras for identification.  For these reasons, facility directors, especially those managing large campuses or properties, should consider deploying thermal cameras to maximise their intrusion detection capabilities for stronger overall security. Thermal cameras maximise intrusion detection capabilities Streamlining entry control with temperature screening Facility executives can also improve their access and entry control security procedures by using radiometric thermal cameras for temperature screening. COVID-19, classified as a global pandemic in March 2020, has permanently changed how facility directors build security and environmental, health and safety (EHS) plans. Now, facility directors are prioritising protocols and technologies that minimise both the risk of exposure as well as the spread of infectious diseases among employees, visitors and contractors. Temperature checks have become one of the most widely adopted as a key component of frontline screening practices across facilities. In fact, General Motors plants and the Pentagon Visiting Center are notable examples of critical facilities deploying radiometric thermal cameras for skin temperature screening.  Radiometric thermal cameras for skin temperature screenings allow for a non-contact, frontline diagnostic tool that enables high throughput. These thermal cameras specifically measure skin surface temperature at the inner corner of the eye, the region medially adjacent to the inner canthus, which is known to be the best measurement spot. The most reliable thermal cameras yield accuracies of ±0.3°C (0.5°F) over a temperature measurement range of 15°C to 45°C (59°F to 113°F).  Available in a handheld, tripod-mounted or fixed-mount form factor, elevated skin temperature thermal cameras are deployed inside entryways, immediately screening people as they walk into the facility. These cameras scan a person up to one to two meters (or three to six feet) away. Premium thermal cameras can scan individuals in two seconds or less. Premium thermal cameras can scan individuals in two seconds or less Thermal cameras are intended for use as an adjunct to clinical procedures in the screening of skin surface temperature. Upon detection of an elevated skin temperature, a person must then undergo a secondary screening where a medical device can determine whether the person has an actual fever or should partake in virus specific testing. By implementing these screening procedures, facility directors ensure a faster, non-invasive method to quickly detect possible signs of infection before an individual enters a populous area. This minimises the risk of communal spread of viruses among employees in the workplace, which ultimately increases workforce health, safety and peace of mind. Today, a total security solution designed to detect both physical threats as well as environmental and health hazards is one that includes thermal cameras for elevated skin temperature screening. Facility managers can strengthen their risk management plans by proactively expanding their security systems to include these solutions. Many physical security solutions are already in place at key entry points as well as additional checkpoints, such as indoor surveillance cameras, visitor management and access control. Implementing screening stations with specific radiometric thermal cameras is a logical integration at these locations. Choosing the right solution for your facility While thermal cameras for perimeter protection and elevated skin temperature screening are valuable components to the overall security system, facility directors need to know that not all thermal is created equal. Thermal cameras need to be carefully researched and evaluated before deployment. Here are a few best practices for choosing the right thermal camera for your facility and application. Define your application: A thermal camera made for long-range perimeter monitoring functions differently than a thermal camera built for elevated skin temperature screening. Make sure to choose a camera designed for your specific use case. Know the distinguishing characteristics: Be aware of which technological features separate high-performing cameras from low-end options. For perimeter thermal cameras, resolution, detection range and integration capabilities matter. For elevated skin temperature screening cameras, resolution, sensitivity, accuracy and stability are critical. Check for certifications: Select a thermal camera with proven interoperability. Consider one that is ONVIF-compliant to ensure integration with the overall security system and chosen video management software. Additionally, for elevated skin temperature cameras, consider one that has a 510(k) filing (K033967) with the U.S. Federal and Drug Administration as well as one that supports other screening standards such as ISO/TR 13154:2017 and IEC 80601-2-59:2017. Work with experienced partners: Work with a system integrator who is knowledgeable in thermal. Choose thermal cameras from manufacturers with a solid track record of success for both security and elevated skin temperature screening deployments. Leverage guidebooks, site planning tools and online trainings that these experienced manufacturers have to offer to maximise performance.