Remote Monitoring Learning Center logo
Phone headset
Expert Helpline

A Remote Site Security Risk Problem: Doors Propped Open

Morgana Siggins
Morgana Siggins
Monitoring Specialist

Your remote sites are vulnerable. This is especially true if you have an isolated and unmanned site with unsupervised workers coming and going all the time and propping open doors - because they might end up forgetting to close them.

This turns your remote sites into an easy prey for thieves and vandals (animals and bad weather are not excluded either).

Unfortunately, the traditional ways to control remote access, such as a lock-and-key system, are neither practical nor cheap.

Keys can be lost, stolen, or copied and are difficult to keep track of.

Let's take a look at how you can effectively manage site access and prevent risks from propped doors open without blowing a hole in your budget.

Control your Doors with a Building Access System (BAS)

A Building Access System (BAS) is a comprehensive building management system that integrates into an existing alarm management platform. With the system in place, a log of all site access, including the time of day and location that access was granted, is maintained. In addition, alarms such as intrusions and excessive access attempts are reported to T/Mon on a per-door basis.

Integrating the BAS into an existing alarm management platform provides an inexpensive and effective way to achieve centralized regulation of facility access.

The BAS system provides valuable security to your remote sites and deters theft, break-ins and vandalism. And the system consists of:

  • A master station

  • An RTU

  • An Entry Control Unit

  • And a Proxy Reader

The T/Mon Master Station

The BAS works as a software module in T/MonXM software. It assigns each user with a unique user profile containing information such as which sites are allowed to be accessed, the door numbers, days of the week access is allowed, a start/stop time, and a beginning and ending date (primarily for contractors, new employees, or short term employees).

T/MonXM software on the T/Mon LNX hardware monitors, mediates, and forwards alarm data in over 25 standard and proprietary protocols, including legacy equipment no one else can support.

There is also theT/Mon BAS. T/Mon BAS gives you centralized, electronic control over your doors.

You can use T/Mon BAS to:

  • Grant individual door access rights for up to 1,300 users

  • View and control access from all of your facilities on one screen

  • Monitor unauthorized door access attempts and intrusion alarms

  • Remotely "buzz-in" site visitors from your central office

  • Maintain access history logs for review after an incident

T/Mon BAS: Real-time visibility and control of electronic door access.

T/Mon BAS gives you the advanced access control capabilities of T/Mon LNX, without network alarm monitoring functions you may not need.

The NetGuardian 832A RTU

The NetGuardian 832A controls local access at your remote sites. This unit maintains a list of personnel who are authorized to access the facility. It records all valid entries, attempts, and the time of each action in non-volatile RAM. It can also receive a control from T/Mon to remotely open a door.

The comprehensive and expandable alarm monitoring solution that goes anywhere in your network, the NetGuardian 832A is NEBS-certified, LAN-based, made for SNMP, and provides stand-alone alarm monitoring.

The NetGuardian indicates conditions such as valid entry, invalid access attempt, and system lockout. The unit supports up to 1,300 user profiles for distribution between door entry points.

The Entry Control Unit

The Entry Control Unit, or simply ECU, acts as an interface between the NetGuardian and the proxy reader. Any access code that's entered is accepted by the ECU and passed on to the NetGuardian for validation.

With the ECU you get easy configuration, easy management, and telco-grade reliability at sites that need door control but don't need extensive network monitoring.

Proxy Reader

A proximity card reader eliminates the chance of forgotten keycodes and increases your level of access control. An employee can easily share a keycode with others, but not a proxy card.

In the event that a card is lost or stolen, it can be deactivated in seconds and a new card may be issued in its place.

The ECU LAN with dual proximity readers. With one reader outside the door and the other inside (and a card swipe required for both entry and exit, employee time/entries/exits may be logged.

How BAS Can Help You Monitor Held or Propped Open Doors

You may not care about a typical door-open alarm during business hours, but a door that's propped for more than 3 minutes is a potential threat you must know about.

So, if your main concern is a door propped alarm or door propped open alarm, you can set your BAS' Derived Alarm timer at about 30 seconds to throw alarms after "Door Open" has been standing for 30 seconds straight, for example.

Vertical integration makes DPS's custom design services possible, and the BAS development wasn't an exception.

BAS Propped Door Features for your Special Access Needs

There are some cases, however, when you may want to allow a door to remain unlocked or open. The BAS propped door features allow you to accommodate special access needs at your site.

We've put together the How to Deploy an advanced Building Access System White Paper to answer any other questions about remote site access and remote monitoring.

Click here to download your free copy of the How to Deploy an Advanced Building Access System White Paper

Get your free copy of the White Paper today to know more about how you can protect your revenue through site monitoring.

Get a Custom Application Diagram of Your Perfect-Fit Monitoring System

There is no other network on the planet that is exactly like yours. For that reason, you need to build a monitoring system that's the right fit for you.

"Buying more than you need" and "buying less than you need" are real risks. You also have to think about training, tech support, and upgrade availability.

Send me a quick online message about what you're trying to accomplish. I'll work with you to build custom PDF application diagram that a perfect fit for your network.

Don't make a bad decision

Your network isn't off-the-shelf.

Your monitoring system shouldn't be, either.

Customized monitoring application drawing

We'll walk you through this with a customized monitoring diagram.

Just tell us what you're trying to accomplish with remote monitoring.

Get Your Custom Diagram Now
Return to DPS Telecom

DPS logo