In operating an access control point or entry control facility many issues need to be taken into account. Operation of an Access Control Point (ACP) or Entry Control Facility (ECF) requires many areas of interface with different groups.  An integrated and appropriate “Theory of Operation” is vital to a successfully functioning control point. The information included on this page addresses some of the operation and challenges involved in a perimeter security solution.

Vehicle Detection Loops: Automating Your Access Control Point

This white paper examines different types of presence detection loop applications typically found in access control points. 

Inductant Loop Vehicle Detector Function – Setting and Adjustments

Rear mounted DIP switches and front panel push buttons allow the user to set up operational parameters including frequency and sensitivity settings.

Limit Switch - Settings and Adjustments

For adjustment, it is best to refer to the security equipment manufacturer’s alignment procedure for each limit switch. Security applications for limit switches can be slightly different for various equipment manufacturers.

Motorcycles and Loop Detectors - Is this a Problem?

Inductive loop sensors can reliably detect motorcycles if they are properly configured and adjusted. A number of variables affect the degree to which the introduction of a conductive object will change the effective inductance of the sensor loop.

Why Should Barriers be Tested Regularly?

Security barriers come in a variety of types: wedge barriers, beam barriers, pop-up bollards, drop arms, slide and cantilever gates. Some barriers may be used daily for traffic control. Others, such as final denial barriers, may sit idle for weeks or months until tested or activated in an emergency. Regardless of the type or use, the barriers should be tested on a regular basis. The old adage "Use it or lose it" applies to security barriers.

Why is Security Barrier Drainage Important?

Removal of water from the equipment is crucial to ensuring reliability and longevity of the equipment. Water pooling in a barrier can quickly damage actuators, motors, switches, and wiring which cause rapid deterioration and failure of equipment.

Basic Barrier Maintenance Guide

​For product warranties to be effective, recorded scheduled maintenance is usually required. Please follow the manufacturer’s recommended frequency and maintenance tasks for the specific product.

Recognizing Security Principles

​This white paper examines the role security principles play in achieving a performance‐based, ‘systemic’ view of the engineering, design and construction of Access Control Points (ACP). The goal of this paper is to shed light on the application of security principles and how these may serve as the ’glue’ that connects many separate ACP concepts and stakeholders.

Force Protection Condition (FPCON)

In June 2001, the Department of Defense’s Force Protection Condition (FPCON) replaced the previous Terrorist Threat Condition (THREATCON). FPCON can be described as graduated levels consisting of Delta, Charlie, Bravo, Alpha, and Normal. This progressive level describes the measures needed to be taken by security agencies in response to various threat levels against military facilities.

National Terrorism Advisory System (NTAS) - Elevated or Imminent

​In April 2011, the National Terrorism Advisory System (NTAS) replaced the Homeland Security Advisory System (HSAS), which had been created in 2002. The color-coded HSAS (consisting of RED, ORANGE, YELLOW, BLUE, GREEN), has been reduced to two threats consisting of ‘Imminent Threat Alert’ and ‘Elevated Threat Alert’. 

The library of offerings is continuing to expand and is customizable to accommodate individual organization’s needs. If a topic of interest is not listed in the training library, contact Concentric Security University to allow us to create a program that is unique to the needs of your organization.
UFC Compliant ACP

© 2012 Concentric Security - All Rights Reserved P: 443.609.1115Email: info@ConcentricU.com