Development Center Protection of property, records of movement of persons, control of entering into protected areas

THE SITUATION

One part of a company’s business is developing interior elements for the automotive industry. The company develops prototypes, tests them and prepares them for series production. These steps take place in the development center in a secluded area within the premises of the company...

Viac info

THE SITUATION

One part of a company’s business is developing interior elements for the automotive industry. The company develops prototypes, tests them and prepares them for series production. These steps take place in the development center in a secluded area within the premises of the company.

The entrance to the development center is neither monitored nor protected. This condition can cause serious problems and have a negative impact on business plans and the company’s position in the market.

As the greatest threats, the following were identified:

  • Information leak about the developed products (design, quality of materials, etc.)
  • Stealing of pricey equipment
  • Non-compliance with external suppliers’ safety regulations

OBJECTIVES

  • To prevent information leakage
  • To protect the equipment from being stolen
  • To comply with 3rd party requirements when competing for new projects

Solution

When determining the objectives, it was essential to identify tools that, if employed correctly, would lead to successfully meeting the objectives.

The following tools were determined as crucial:

  • Access System for managing and monitoring the movement of persons in the development center
  • Security System for securing the premises of the development center during the absence of authorized employees
  • Camera System for the identification of unwanted visitors or intruders

Viac info

Solution

When determining the objectives, it was essential to identify tools that, if employed correctly, would lead to successfully meeting the objectives.

The following tools were determined as crucial:

  • Access System for managing and monitoring the movement of persons in the development center
  • Security System for securing the premises of the development center during the absence of authorized employees
  • Camera System for the identification of unwanted visitors or intruders 

Given the aforementioned tools, the development center was equipped with the Contal Nova system and several IP cameras for monitoring the secured area.

The Contal Nova system is composed of software, a database and equipment. It uses identification cards that are the only identifier of a person. The implementation of the system took place over several phases.

1 Choice of appropriate identification cards

Given the security standards of the Contal Nova system, for the identification cards we used Mifare technology with sector reading of the encrypted data.

2 Division of the development center into zones according to security and access

The area was divided into 3 zones:

  • Laboratory
  • Testing Room
  • Prototype Deposit

3 Equipping the respective zones with security elements

All entrance doors into individual rooms were equipped with card readers that have keypads to ensure 2-level authentication (PIN + card). All doors, depending on their type (fire door, escape door…), were equipped with appropriate locks. In the same manner, roll-up gates in the deposit area were also equipped with card readers. The main entrance to the respective zones was equipped with a terminal for controlling the given zone (activation/deactivation of the security system).

The rooms were equipped with motion detectors, detectors of broken glass and contacts monitoring whether the door is open or closed. IP cameras were placed in especially sensitive areas.

4 Creating and assigning authorization levels

Based on the requests of our client, we created authorization levels that define whether a person can access a given area or activate the security system. The authorization levels were then assigned to employees depending on their position and responsibility.

5 Defining the strategy in case of an alarm

After a detailed analysis of the operation itself and the work of guards, the following was added to the system:

  • Sirens that are activated every time a zone is intruded
  • Alarm Communicator – this application sends a text message every time a zone is intruded
  • E-mail notifications – inform whenever an alarm is triggered, etc.

A graphic visualization of the whole system with active elements is available nonstop to the security service.

Contribution

  • Protection of tangible as well as intangible assets of the company
  • Detailed record of movement of persons in the protected area
  • Complying with the requirements set up by an audit
  • Effective overview of people entering the protected area
kia logo
2000px Brother logo v2.svg
doka
Donghee
grafobal
HYZA
inteva
Logo of Plastic Omnium
Mobis
osram
Reutter
TEAM
vac
VAHOSTAV SK 2 COLOR 300dpi
cta

The solutions you will be using

We have the right tools for ensuring the safety of your company.

Jazyková mutácia / Select site language