dedicated to perimeter safety and security
April 2026 Issue
Welcome to April’s powerful newsletter featuring:
- 5 Questions for smartPeople: Insights from Don Erickson, CEO of the Security Industry Association
- Learn What the DTW Incident Reveals About Your Safety as a Vehicle Careens Through its Terminal
- How Biometric Identity Is Redefining Perimeter Definitions & Access
- Most Access Control Failures Start with Power & How to Prevent Them
- Understand How Unified Security Management Brings a Sharp Focus to Perimeter Protection
- Why Gates Fail (And What You Should Do About It)
- Construction Sites Under Siege: Solving a Billion-Dollar Problem Hiding in Plain Sight
- Plus: Company and Product News From The Edge
Enjoy the read!
Trends
The Perimeter Is No Longer Static: It’s a Living System Driving Business Resilience
The perimeter has become the first—and often most critical—operational system assuring and enabling business resilience.
At ISC West, the smartPerimeter.ai education track outlined a fundamental reset in how perimeter safety and security is conceived, funded, and operated.
The result? Perimeter safety and security are now dynamic, intelligence-driven ecosystems that protect the business. It is shedding its legacy identity as unmanaged, static barriers to smart barriers. Performance is now measured by accurate situational awareness and immediate response against threats before they materialize.
The first signal is unmistakable: perimeter security is moving beyond the built environment. Traditional assumptions—fixed power, wired networks, permanent infrastructure—are giving way to scalable, rapidly deployable models. Whether it’s solar-powered electric fences and surveillance units, wireless sensor networks, or autonomous patrol systems, these systems can protect the perimeter quickly and operate almost anywhere. This is not a niche capability; it’s becoming table stakes for logistics yards, utilities, construction sites, and distributed enterprises where risk doesn’t wait for infrastructure to catch up.

Second, risk assessments are re-centering on the perimeter as the starting point. Working from the outside in, rather than the inside out, reflects a simple reality: once a threat reaches the building, options narrow and costs escalate. That realization is driving investment outward—into earlier detection, stronger deterrence, and layered delay mechanisms. Fencing, barriers, and gates are not disappearing; they are being instrumented. The physical layer is becoming sensor-ready, feeding intelligence upstream rather than simply standing as a passive obstacle.
Overlaying this is a generational change in how risk is understood. The threat model has expanded, and with it, the expectations placed on perimeter systems. It’s no longer just about stopping intruders. It’s about managing uncertainty across a wider spectrum—drones, vehicle incursions, organized theft, insider activity, and coordinated disruptions. Risk assessment is evolving from periodic evaluation to continuous intelligence. Security leaders are being pushed to think less like facility managers and more like operators of dynamic systems, where conditions change in real time and responses must keep pace.
That shift enables perimeter design to not just “see” but to “act.” Autonomous response is moving from concept to requirement. Detection alone is no longer enough; systems must trigger actions—alerts, lighting changes, audio warnings, drone deployment, or integration with downstream workflows—without waiting for human intervention. This is where AI, analytics, and orchestration platforms converge. The goal is to compress the time between detection and response to near zero.
Underpinning this is the role that perimeter systems play as a primary source of operational intelligence, not just a defensive layer. Every sensor, camera, and access point is generating information that can be used to understand patterns, optimize operations, and justify investment. The organizations moving fastest are treating perimeter data as a business asset—feeding it into broader systems for analytics, compliance, and decision-making. Security is no longer a cost center when it can demonstrate measurable impact on uptime, loss prevention, and operational efficiency.
The benefits of moving in this direction are significant. Faster deployment reduces exposure during critical windows. Earlier detection and automated response shrink the gap between threat and action. Integrated systems improve situational awareness and reduce the burden on understaffed teams. And data-driven operations give security leaders a language that resonates in the boardroom—risk management translated into business outcomes.
The shift in mindset is just beginning as organizations manage solutions as continuously evolving platforms, not project-based installs. Autonomous systems, for all applications, raise questions around trust, reliability, and governance—particularly when decisions are made without human oversight. But cultural acceptance is moving toward trusting proven, repeatable models.
As a result, the perimeter safety and security industry is advancing the solutions as customer adoption accelerates.
-Mark McCourt, Publisher
5 Questions With…
Don Erickson, CEO, The Security Industry Association
Don is celebrating his 20th year with SIA. And our industry is too. He has and continues to make a remarkable contribution to SIA’s members and the industry at large. SIA is the leading trade association representing manufacturers, integrators, and innovators across the global security market. Under Don’s leadership, SIA’s legislative impact, industry role in education and standards, and business have grown dramatically.
With ISC West 2026 now behind us, we connected with Don to capture key takeaways and what comes next. He outlines SIA’s priorities for the year ahead, why the perimeter continues to rise as a strategic focus, and how AI is redefining the balance between innovation, performance and risk.
Thank you Don. As always, your thoughts and insights are greatly appreciated and truly valuable. Thank you for your work in the industry and for your great contribution to the Security Industry Association.
-smartPerimeter
A Preventable Breach: What the DTW Incident Reveals When Perimeter Security Fails
Question: What’s the most expensive vehicle barrier at a busy airport terminal?
Answer: The one that fails. -Rob Reiter
On January 23, 2026, a vehicle breached the entrance of Detroit Metropolitan Airport’s McNamara Terminal (DTW), injuring six people before crashing into a Delta Air Lines ticket counter.
The DTW incident was not terrorism. It was not a coordinated attack. It was an impulsive act by a single individual. But it raises a critical question: what could the outcome have been if it had been intentional?
It exposed a critical gap in perimeter protection at one of the busiest airports in the United States.
Detroit Metropolitan Airport (DTW) serves more than 30 million passengers annually. Thousands of employees and airline personnel rely on the facility’s infrastructure, operations and security systems to function seamlessly. In environments operating at this scale, security failures are rarely isolated—they are systemic.
This event was not a terrorist attack. But airports have been on notice for years that terminals are vulnerable to deliberate vehicle incursions, and DTW had not adequately addressed that risk.
That requires layered protection aligned to specific threats. Fences deter pedestrian and animal intrusion. Gates control traffic access. Ballistic glass provides resistance to blast and gunfire. Bollards and barrier systems are intended to stop vehicle-based attacks.
In this case, DTW did not scale protection appropriately. The bollards installed at the terminal entrance were not capable of stopping even a passenger vehicle, leaving a clear vulnerability at a primary access point.
The standard of care requires that foreseeable threats are addressed with measures capable of stopping those threats. For vehicle incursions, barrier systems must be designed to withstand the impact forces of a vehicle of a given weight traveling at a given speed. National standards exist, with crash ratings established through ASTM testing.
At this terminal entrance, the installed bollard system was not crash-rated to withstand the impact that occurred. This is evident for two reasons:
1.
The vehicle penetrated the bollard array and continued through the glass entryway into the terminal, leaving a dislodged bollard on the floor of the terminal.

Bollard upended by vehicle and knocked through the glass entryway.
2.
Scene evidence indicates the system was not installed as a properly engineered crash-rated barrier.

Bollard in the same array shows a bolt-down installation. In high-security applications such as airport terminals, this method is typically used only as a decorative stainless steel cover over a crash-rated system—not as a standalone crash-rated solution.
Airports in the U.S. have been on notice for decades that vehicles can be used as weapons. DTW knew the risk—the presence of bollards makes that clear. But knowing the risk is not the same as investing in the proper crash-rated barriers to stop it.
Perimeter protection is measured by what happens at the moment of impact. In this case, it failed. The question now is not whether the threat was understood, but why the protection in place was not capable of stopping it.
On Site the Day of the Incident! -Rob Miller
As a Detroit-area resident who frequently travels, I’ve passed those bollards hundreds of times since they were installed. I had always assumed they were designed and installed to stop a vehicle.
I coincidentally landed shortly after the incident and was able to see the aftermath firsthand. Two things stood out immediately.
First, I made a bad assumption.
The bollards were not designed to stop a vehicle—they were simply a visual deterrent. This is what we refer to as security theater: something that looks like a security measure but does not actually provide protection.
Second, there is a broader concern for the security provider community. Initial statements from airport officials suggested the bollards were “supposed to have stopped a vehicle and did not.” That raises a more important question: whether the system was properly specified, installed and aligned to the actual threat.
DTW subsequently installed concrete barriers at terminal entrances and stated the airport was “more secure now than it was last week.” While these measures may provide an immediate visual deterrent, free-standing concrete barriers are not typically engineered to stop a vehicle under impact conditions. That response raises questions about whether the solution was aligned with established perimeter protection practices.
There are clearly gaps in the physical security approach. My hope is that this incident leads to a more rigorous assessment—one that involves qualified experts, properly evaluates risk and addresses the vulnerabilities that still exist.

Concrete barriers installed outside the DTW terminal entrance following the incident, serving as a visible but interim vehicle mitigation measure.
Rob Reiter is the Co-Founder of the Storefront Safety Council.
Robert Miller, PSP, CDT, is an Independent Consultant and Subject Matter Expert in Fences, Gates, Bollards, and Barriers at Imperial PCS.
How Biometrics Are Redefining Perimeter Access
Capture → Extraction → Encoding → Storage → Matching
An attempt at decoding the 5 steps in biometric processing (for novices)
We are living through a shift in how we secure our perimeters. As security becomes more automated and identity-driven, one question remains: Are we ready for it?
From Science Fiction to the Perimeter Fence Line
We’ve seen this before, just not in real life (yet).
- Darth Vader didn’t badge into the Death Star
- The Starship bridge recognized Captain Kirk’s voice instantly
- Replicants in Blade Runner were detected through eye-based analysis
- George Jetson paid—and accessed services—with his face, voice and PIN
What used to be fiction is now showing up at our front gates, turnstiles and loading docks.
Biometrics—what I call AID2entry technology—are no longer just about convenience. It’s stronger security that helps “AID” who gets through the perimeter… and who doesn’t.
The New Perimeter: Identity at the Edge
Traditionally, perimeter security was reactive. It required asking a basic question: Does this person entering my facility even have a badge? A gap that can have serious consequences.
Today, we can proactively verify identity using both passive and active cues—answering “this is the person they claim to be,” before they reach the gate.
This shift is massive.
Once identity becomes a control layer for entry, the perimeter transforms from a barrier into an intelligent decision point.
And that decision is powered by five steps in the biometric process below.
“The value of the asset being protected should drive selection of the biometric modality being used.”
Capture → Extraction → Encoding → Storage → Matching
Let’s walk through the steps with perimeter protection in mind:
Important: This process cannot begin without proper consent, which varies significantly by state in the U.S. Consult a security professional to understand AI privacy and biometric regulations where AID2entry technology is being deployed.
Step 1: CAPTURE
The moment a sensor collects raw data, essentially images or inputs of the individual during onboarding.
Depending on the modality, this is when a user presents a finger, face, iris, palm/vein or voice to a reader:
- A fingerprint or palm/vein scanner captures ridge patterns
- A camera captures facial geometry
- An infrared sensor captures iris (not retina) patterns
- A microphone captures voice characteristics
Liveness detection software can also be incorporated to verify that a real person is present at the sensor, helping prevent spoofing attempts using photos, masks or recorded audio/video.
Step 2: EXTRACTION
Once capture occurs, algorithms analyze the raw data collected in Step 1 to identify distinctive features that make an individual unique.
Examples include:
- Facial features (eyes, nose, jawline)
- Gait and movement patterns (behavioral biometrics captured through video)
- Audio and behavioral cues
This is where video and audio become especially powerful.
From this point on, the system is no longer evaluating an actual face or voice—it is reading numerical data. The individual has been digitized.
Step 3: ENCODING
Once unique features have been extracted and digitized in Step 2, they are converted into a biometric template—a string of numbers that uniquely represents the individual.
Creating this template is similar to a locksmith carving a key. The unique patterns are translated into data that can grant access at a perimeter gate or door.
Modern biometric templates are compact, allowing for faster comparisons. For security and privacy, they are typically encrypted and digitally signed before storage or transmission. Reconstructing the original biometric data from this template is not computationally feasible.
This process differentiates one individual from another and enables what is known as a one-to-one (1:1) match—verifying that a person is who they claim to be. At that point, the individual effectively becomes the credential.
Step 4: STORAGE
Where is identity stored when it isn’t being used?
Once encoded, biometric templates must be stored in a secure system that can retrieve them for comparison. Different environments use different storage models.
- On-device (local): Everything happens within a single unit, typically limited to 1:1 verification. Data is not shared. Common in mobile devices, laptops and some cameras/readers.
- On-premise: Biometric data is stored on local servers behind the organization’s firewall, providing full control. Nothing leaves the network. Often used in integrated access control and video systems.
- Centralized: Data is stored in a single repository, such as a server or cloud database. These systems can manage millions or billions of identities (e.g., border control or national ID systems).
- Temporary (ephemeral): Data is stored locally for short-term identity verification and then deleted, often within 24 hours. For example, TSA PreCheck systems compare a live image to ID records and a daily passenger gallery.
- Cloud: Biometric data is stored in cloud infrastructure, enabling scalability across multiple sites and remote management via API.
- Identity and Access Management (IAM): Biometric templates are tied to broader identity systems that manage permissions, access levels, audit trails and compliance.
- Verifiable digital identity (emerging): Instead of storing biometric templates, this model uses government-issued digital credentials (such as mobile driver’s licenses) stored in a personal digital wallet. Access systems verify the credential at the point of entry, allowing individuals to control what they share. Organizations like the NFID Foundation are developing standards for how these identities integrate with physical access systems.
Note: This represents a fundamentally different model from biometric template storage—one we’ll explore further in next month’s Bring Your Own Credential (BYOC) article.
“The use of biometrics and method of storage may change based on the perimeter and vertical market. A cloud-based fingerprint biometric with cloud storage may suffice for an SMB office, while finger, iris or face biometrics with on-premise storage may be required for higher-security environments.”
“That’s the shift from ‘you are the credential’ to ‘you bring the credential,’ and it’s what makes Bring Your Own Credential possible.”
Step 5: MATCHING – The Decision
Matching is the final stage of the biometric process.
When someone attempts to authenticate at the perimeter, the system:
- Captures their biometric
- Extracts features
- Encodes a template
- Compares it to stored identities
- Decides to open—or stay closed
Identity Becomes the Security Layer
The future of enterprise security is not just stronger locks or better passwords—it is stronger identity assurance.
By transforming biological and behavioral traits into encrypted mathematical templates, biometric systems create a unified framework for both physical and digital security.
Instead of verifying credentials once, organizations can verify identity at every access point—from the front door to the workstation.
It all comes back to a simple process: capture, extraction, encoding, storage and matching—turning the human body into one of the most powerful credentials in modern security.
The question isn’t whether this technology exists—it’s how we choose to use it.
-By Doug OGorden
CUTTING THROUGH THE NOISE
How Unified Security Management Brings a Sharp Focus to Perimeter Protection
If you manage perimeter security for any kind of facility, you already know the problem: too many alarms and too many late-night notifications that turn out to be a stray animal, a gust of wind, or a shadow that tripped a motion detector. The noise is more than just annoying; it’s potentially dangerous. Because somewhere buried in all that clutter might be a real threat, and the more false alarms your team chases, the less attention they have left for the ones that matter.
This is the reality facing security professionals across nearly every sector, from logistics hubs and data centers to government campuses and critical infrastructure. And it’s driving a fundamental shift toward unified management, an approach that brings video, sensors, access control, and analytics together under a single platform so security teams can see, understand, and act on what’s happening across their entire perimeter – from one place. The old model of stacking disconnected sensors and hoping someone catches the right alert is giving way to integrated systems built on open platform video technology, smart analytics, and AI-powered tools that don’t just detect activity but help teams respond to it.
For data centers and communications facilities, the perimeter is no longer a passive boundary—it is the first measurable control in the uptime chain. And increasingly, it is a metric the board understands.
Physical and digital perimeters now operate as a unified line of defense. When perimeter protection fails, business continuity is rarely far behind.
Breaking Down the Silos
For years, perimeter security operated in disconnected layers. Video systems lived in one world. Access control lived in another. Alarm panels, intercoms, license plate readers, and environmental sensors all generated data, but rarely talked to each other. Security teams toggled between multiple interfaces, piecing together information while trying to make real-time decisions. It was like trying to conduct an orchestra when every musician is playing from a different sheet of music.
Unified management changes that equation. At its core, the concept is straightforward: rather than running separate systems that each handle one piece of the security puzzle, a unified approach connects them through an open platform video management system that serves as the central hub. Cameras, sensors, access control devices, and analytics all feed into a single operational view, giving operators the full picture instead of fragments. Open platform architecture means these systems are hardware agnostic, so organizations aren’t forced to rip out existing investments in cameras or infrastructure to get there. The VMS connects to what’s already in place and layers intelligence on top.
This matters because perimeter environments are rarely static. A distribution center might add a new loading dock. A campus might expand its parking areas. A government facility might need to temporarily increase monitoring around a sensitive building. The flexibility of a unified, open platform means security teams can scale and adapt without rebuilding from scratch every time conditions change.
That same openness also simplifies how organizations share information. Internal departments, from operations to risk management, can access relevant video data and reports through the same platform. And when an incident requires coordination with law enforcement or first responders, open systems make it straightforward to securely and quickly export and share critical evidence without format conflicts or proprietary barriers.
From Detection to Prevention
The security industry has talked about “proactive” for a long time, but we’re only now reaching the point where the technology genuinely delivers on that promise. The Security Industry Association’s 2026 Megatrends report identifies this evolution as one of the defining trends in the industry, noting that AI is enabling a historic shift from detection and response toward actual prevention. The report also highlights the growing unification of the security experience layer, where platforms for access control, video, and intrusion detection converge into a single architecture that surfaces actionable insights rather than raw data.
In practical terms, what does this look like for perimeter security? Consider a unified VMS with integrated AI-powered video analytics monitoring a warehouse perimeter. Traditional motion detection would alert on anything that moves, leaving operators to sort through dozens of irrelevant notifications. An AI-driven system, by contrast, can distinguish between a person and an animal, between a vehicle approaching a restricted gate and a delivery truck following its normal route. It can flag a specific behavior, like someone loitering near a fence line or a vehicle circling a facility and push that alert not just to a control room monitor but to specific team members on mobile devices, along with the relevant video feed and contextual information.
This kind of intelligent filtering changes the math for security operations. Instead of watching walls of monitors and hoping to spot something, operators are freed to focus on verified, prioritized events. The SIA Megatrends report frames it well: AI-driven platforms are increasingly replacing the labor-intensive task of monitoring video feeds and ranking alarms, which allows security personnel to transition from reactive notification watchers to proactive risk analysts.
Smarter Tools, Faster Responses
The applications extend well beyond simple intrusion detection. Line-crossing alerts can notify teams instantly when someone enters a restricted zone, whether that’s a fenced perimeter, a rooftop, or a secure loading area. Tailgating detection at access-controlled entry points flags when a single badge scan lets two people through a door. Appearance-matching tools can help security teams track a person of interest across multiple cameras in seconds rather than hours.
License plate recognition at entry points adds yet another layer of awareness, automatically cross-referencing vehicles against watchlists or flagging unauthorized traffic.
Under a unified management approach, all of this data feeds into a single operational picture rather than being scattered across separate applications. When an alert fires, the video, sensor data, access log, and map location appear together in a single interface, enabling faster decisions and more coordinated responses. That’s the practical payoff of unification: not just more data, but better context at the moment it matters most.
For organizations managing multiple sites, cloud connectivity adds another dimension. Hybrid deployments, combining on-premises processing for real-time operations with cloud storage and remote access, give security leaders the ability to monitor and manage dispersed facilities from a central location. Smaller operations can take advantage of cloud-native VMS options that provide advanced analytics and AI-powered search without the overhead of maintaining local server infrastructure. Either way, the cost model becomes more flexible, and the barrier to adopting unified management drops considerably.
Built to Evolve
This flexibility also speaks to one of the most critical and often underappreciated benefits of open platform architecture: protecting existing investments. Some VMS providers are moving toward closed ecosystems that require specific hardware from specific manufacturers. For organizations that have already invested in cameras, sensors, and networking infrastructure across a perimeter, being told they need to start over isn’t just frustrating; it can be a budget killer. Open systems take the opposite approach, integrating with a wide range of devices and third-party technologies through APIs and software development kits, so security teams can adopt new capabilities incrementally rather than all at once.
That incremental approach is becoming critical as the pace of innovation accelerates. Edge devices are getting smarter, with manufacturers embedding AI-lite analytics directly into cameras and sensors. Drone detection, thermal imaging, and autonomous patrol technologies are maturing rapidly. Digital evidence management is evolving to give organizations secure, license-free ways to store, share, and manage case-related video without proprietary lock-in. Each of these capabilities adds value, but only if the underlying management platform can bring them together into a coherent system of systems.
The security industry’s trajectory is clear. Data is becoming the most valuable asset in any security operation, and unified management platforms are the tools that transform raw data into intelligence. For perimeter security professionals, the opportunity is to move beyond the noise, beyond the false alarms and the disconnected systems, and toward a unified approach that’s smarter, more integrated, and built to evolve. The organizations that embrace unified, open platform management today won’t just be better protected. They’ll be better positioned for whatever comes next.
-By Sam Phillips, Public Safety Lead, Milestone Systems
Most Access Control Failures Start with Power—Here’s How to Prevent Them
All power is not created equal, especially when designing and installing electrified access control (EAC) hardware and systems in new or retrofit applications.
Power supply requirements for electrified access control (EAC) hardware differ significantly from other devices and fire and life safety systems—one size does not fit all.
Unlike camera system power requirements, access control systems draw more current for locking hardware and during access control-related events. As the industry transitions from solenoid-based electric locking devices to motorized devices, demand for specific power supply requirements has also increased.
Types of Power Supplies
Switching Power Supplies
Switching Power Supplies are typically designed for use with resistive or capacitive loads such as low voltage lamps, alarm panels, cameras and signaling devices. They are lighter in weight, efficient (less heat generated) and are cheaper to manufacture. The low cost of switching power supplies often leads to their misapplication.
Switching power supplies are not recommended for use with access controls and electric locks for several reasons. Typical switching power supplies have trouble handling the inductive loads produced by locking devices with coils or solenoids due to the limited current reserve available to handle periods of high inrush. Excessive current draw (even for a short period of time) will briefly stop a switching supply from operating and may even permanently damage it.
Another byproduct of the switching power supply is a high frequency noise component that appears in the DC voltage output. A properly designed supply includes a filter circuit to reduce or eliminate this noise. Many switching power supplies do not include more effective output filtering due to cost constraints. The filter part of the supply can cost as much as the regulator circuit so a good high frequency filter is often left out. Although the noise will not harm a simple device like an electric strike, the noise may cause erratic operation of electronic equipment such as access controls, electronically controlled locks, panic bars and door controllers, causing them to malfunction and may even damage these units.
These “low cost” switching supplies often require that you supply your own power transformer and assemble these two components in your own box. The result will be a NON-UL-listed power supply, giving local inspectors the opportunity not to approve an installation.
Linear Power Supplies
Linear Power Supplies have been used for years for powering resistive, capacitive and inductive loads (devices with coils or solenoids, such as electromechanical and electromagnetic locks and strikes) due to their ability to handle large inrush currents. Since most of the DC filtering is done with large filter capacitors, there is ample reserve power to provide extra current for short periods of time without malfunction or damage. The output is also free of high frequency noise found in switching power supplies. making them practical for access control applications.
However, the tradeoff is heat generated by the regulator due to moderate efficiency. The heat generated can lead to early failure of the temperature sensitive components housed near the supply board.
Hybrid Power Supplies
Hybrid Access Control Power Supplies are ideal for powering resistive, capacitive and inductive loads—the type of unique power loads common to access control locking devices. Hybrid power supplies combine the efficiency (low heat generation) of a switching supply and the rugged inductive load capability of a linear power supply.
This can be accomplished by adding extra filtering to the output stage of the power supply to provide clean, noise-free power for access controls with enough current reserve to reliably power inductive loads. Built-in inductive kickback protection helps manage high inrush protection caused by electric lock solenoids and motors. This type of hybrid power supply is a good overall choice for powering all access control system components.
Preventing Power Issues in Access Control Systems
EAC Power Issues
Based on more than 50 years of manufacturing electronic access and egress control solutions, including locking hardware and power supplies, SDC has found that 75-85% of access control operating problems and technical support calls are due to power issues*, resulting in:
- Dead Systems
- Malfunctioning locks or intermittent operation of accessories, controllers
- Locking devices that won’t respond reliably
Why? Because EAC power requirements differ from systems like CCTV. These issues can be eliminated by following best practices for power design and installation protocols specific to electrified access control hardware, including:
- Access control systems require steady low-voltage DC power
- Access control systems generally draw higher current during access control-related events involving readers, shunt and strike relays, door locking devices, gate operators, controllers and annunciators

Plan Now to Avoid Trouble Later
Before selecting a power supply, we recommend you plan now to avoid trouble later. This means you should carefully evaluate your project to avoid common installation and operating problems.
- Understand the power required and know the power available (if retrofitting).
- If retrofitting, what modifications have been done over the years affecting the capacity of the power supply?
- Power supplies wear out. If more than 10 years old, replace it.
- Do all the products really work together? Take responsibility.
- Code Compliance – be aware of applicable regional and national codes.
- UL 294 – become familiar with this access control standard. Determine whether your AHJ requires the installation to be UL 294 compliant, and get your AHJ involved in your system design.
- Battery Backup Calculations – how long must the system function after power loss?
- Low Voltage license – is one required in your jurisdiction?
- Don’t cut corners on system design.
- Plan not to come back, do it right the first time.
- Plan for future expansion – no one has ever needed less power for their facility’s access control system. Requirements change over time.
Low Voltage Power
With few exceptions, access control power concerns low-voltage, 12 or 24-volt DC power for most access control systems. Unlike security camera/video systems typically deployed throughout a facility, access control locking hardware draws more current, especially during an access control event – such as the locking or unlocking of a device. Providing steady, low-voltage DC current requires a power supply to convert incoming AC voltage to DC.
Calculating Current Load
Before selecting power supplies for your access control system, you must calculate the power load (current) required for each door opening.
Use a Door Checklist like this example to fill in values and calculate the current load:
- Locking Device__________ Amps
- Rex Button__________ Amps
- Control Panel__________ Amps
- In/Out Readers__________ Amps
- Annunciator__________ Amps
- Total:__________ Amps
Next, add a 30% safety margin. Combine these values for an overall system total, as well as subtotals per floor or building. This will help you to:
- Determine what size power supply is needed.
- Select and locate the appropriate power supply components.
- Determine wire gauge requirements based on load, cable distance and voltage drop.
Voltage Drop
Power supply voltage will drop over long cable distances due to wire resistance. Operating access control devices with inadequate or excess voltage makes them run hotter, wear out faster, operate erratically or not at all. A good rule of thumb for access control devices is that voltage drop cannot exceed 5% of the supply voltage. There are many free voltage drop calculators available on the internet to obtain a voltage drop calculation by simply entering the wire gauge, voltage, distance and load current (Amps).
Centralized Power
Before proceeding, you’ll need to consider what type of power system—centralized or distributed—is best for your installation, as it will greatly affect your voltage drop calculations. If your project involves multiple doors, there are pros and cons to using one large, centralized power supply to meet the system requirements. The pros and cons of centralized power deployment are:
PROS
- Supplies are protected from vandalism
- Single location for fire system interface
- Easier to monitor/maintain power system
- Lower cost per door (based on cable distance, labor costs)
CONS
- Single point of system-wide failure (especially when using one large supply)
- Difficult to reconfigure for system expansion
- Longer, heavier cabling required for home runs with centralized power

Distributed Power
Distributed power refers to using a power supply for each door. The pros and cons of centralized power deployment are:

PROS
- Adequate power will be provided for each new door
- Easier to accommodate system expansion
- Shorter, lighter gauge cabling can be used
CONS
- Higher cost per door
The point can be made that it is also easier to service everything at the point of failure in a distributed power system.
Dual Voltage Output
Dual Voltage Output is frequently required when powering access control panels at 12VDC and door locking devices at 24VDC. Look for 12/24VDC linear power supplies with various current output capabilities and/or add-in 12VDC regulator modules to supply power to access controllers, readers, or other devices.
What Else to Look For In a Power Supply
Much of the selection criteria for a power supply depends on your specific project application. However, there are some features worth recommending:
- Field selectable 12 or 24VDC, regulated and filtered
- Auto-resetting output circuit protection
- Backup battery with isolated battery charger
- Low battery disconnect
- Emergency release input (also the fire alarm input)
- Input, output and battery status LEDs
Electrified hardware today is highly reliable. Unless it’s improperly installed or damaged, it will typically perform for years. But without proper attention to power and power supply design, failures are only a matter of time.
Build the Knowledge to Stay Ahead of the Game
Avoiding costly callbacks and protecting your reputation matters. Maintaining fundamental knowledge of access control power is key. There is always something new to learn, or a special tip to apply that will make all the difference on your next door opening project. We’ve learned that with basic access control power skills, you can immediately address possible conflicts between what was designed versus what was installed, repaired or upgraded for most access control projects.
Selecting the right power supply is one component of avoiding access control power problems. You should also be comfortable with basic electricity concepts. Many people with years of industry experience have never had any formal electrical training. With the increasing use of more sophisticated electronic systems and circuitry, as well as increasing utility reliability issues from our aging power grid, it is important that you have a strong foundation to avoid creating issues down the road.
Remember, manufacturers and industry associations like ALOA, DHI, and ESA have a wealth of information, tools and training to assist you in your electrified door hardware and access control projects.
By Kerby Lecka, Security Door Controls (SDC)
About the Author
Kerby Lecka is the Marketing Director at Security Door Controls (SDC). He can be reached at kerby@sdcsecurity.com.
* Data from SDC Technical Support Logs
Why Perimeter Gates Fail (And What Security Leaders Can Do About It)
Automated perimeter gates have become a standard feature across industrial facilities, logistics hubs, corporate campuses, and critical infrastructure sites. The main idea is simple: reduce the need for staffed guard posts while still keeping access secure and controlled.
But in real-world use, these systems often fall short of expectations.
Problems like tailgating, sensor failures, and poor integration can create new security risks if automated gates aren’t well-designed or managed. Research from ASIS International shows how widespread this is: over 90% of organizations had an access control failure in just six months. Entry points continue to be a major weak spot in physical security.
So why do perimeter gate systems fail, and what steps can security leaders take to improve them?
Can Automated Gates Replace Guards?
For many organizations, cost is the main reason for choosing automated gates.
Staffed gatehouses can cost well over $100,000 a year when you include round-the-clock coverage, training and staff turnover. Automation can be a good alternative, but only if it’s done right.
Replacing guards with gates is not a simple exchange. Guards use judgment, adapt to situations, and make decisions in real time, while automated systems depend only on set rules, sensors, and how well they connect with other systems.
If the system isn’t carefully designed, organizations may save on labor but end up with new security gaps.
Tailgating and Piggybacking: A Persistent Weak Point
Tailgating is one of the most common and often overlooked problems in perimeter security.
ASIS International found that 61% of organizations have had tailgating or piggybacking incidents with their access control systems. While this is often linked to pedestrian gates, it’s just as much of a problem at vehicle gates.
In practice, this can happen when one authorized vehicle enters and another follows closely before the gate shuts. Without good detection or enforcement, both vehicles get in.
This shows a key weakness of automation. Without extra checks like video analytics or a second form of authentication, gates alone can’t reliably make sure only one vehicle enters at a time.
Poor Integration Between Systems
Another common problem isn’t the gate itself, but the systems connected to it. Many perimeter gates work on their own, separate from the rest of the security system. This leads to gaps in what can be seen and how quickly teams can respond.
Typical integration issues include access control systems that don’t communicate with gate operators, a lack of video verification at entry points, or no automated alerts or responses triggered by suspicious activity.
Modern security strategies focus more on connecting systems so that gates, cameras, and access controls all work together in real time. Without this kind of integration, even the best gate hardware is just a standalone barrier.
Detection and Sensor Failures
Automated gates are only as dependable as the sensors they use. Vehicle detection systems like loop detectors, photo eyes, and radar sensors are key to safe and accurate gate operation. But these parts often fail.
Common issues include:
- Improper installation of loop detectors
- Misaligned or obstructed sensors
- Environmental interference from weather, debris, or lighting conditions
Gate operators from companies like Doorking are made to work with many types of detection technology. Still, how well they work depends a lot on proper installation, calibration, and regular maintenance.
If sensors fail, gates might open when they shouldn’t or stay closed when they should open. This can cause security risks and disrupt operations.
Poor Traffic Flow and Site Design
Not every gate failure is due to technology. Often, the main problem is poor site planning. Even the best gate systems can fail if traffic flow isn’t planned for.
Common design problems include vehicle congestion at entry and exit points, inadequate lane separation for inbound and outbound traffic, and uncontrolled bypass routes around the gate. These problems can cause unsafe situations, make drivers frustrated, and give more chances for unauthorized access.
Security systems don’t work in isolation. They need to match how people and vehicles really move around a site.
Maintenance and Mechanical Reliability
Automated gates are mechanical systems designed to operate in harsh environments. They face weather, constant use, and often heavy industrial traffic. Over time, wear and tear will happen.
Without regular maintenance, organizations may encounter:
- Slower gate operation or complete failure
- Increased downtime
- Higher long-term repair costs
Preventive maintenance is often missed in budgets and plans, but it’s key for keeping systems reliable. If a gate won’t open, it can stop operations. If it won’t close, it can put security at risk.
The Rise of Layered Perimeter Security
One of the biggest changes in recent years is how security leaders approach perimeter protection.
Instead of depending on just one barrier, organizations are now using layered security strategies. This matches advice from the U.S. Department of Homeland Security, which recommends controlled entry points and integrated defenses to reduce unauthorized access and vehicle threats.
Research from the Security Industry Association also shows the need to address many types of attacks, from forced entry to people taking advantage of gaps in operations.
In practice, this means gates are no longer used alone. They are just one part of a larger system that might include:
- Perimeter fencing
- Intrusion detection systems
- Video surveillance and analytics
- Remote monitoring and response
Providers like AMAROK show how layered security can make sites stronger by combining physical barriers with detection and monitoring technology.
The main point is clear: no single technology can secure a perimeter by itself.
Beyond the Gate
Automated gates are still useful for perimeter security, but they are not a simple, plug-and-play solution.
Their success depends on more than just the hardware. It requires thoughtful system design, integration with broader security technologies, reliable detection and sensor performance, and ongoing maintenance and operational discipline. Most importantly, it takes a change in mindset.
For security leaders, the goal is not just to install a gate. It’s to make sure the gate works as part of a coordinated, layered defense. In reality, security failures rarely happen at just one spot. They happen in the spaces between systems.
Construction Sites Under Siege: Theft, Copper Crime and Organized Intrusion

Construction companies are not strangers to risk. Weather delays, labor shortages, and supply chain disruptions are part of the business. What has changed—and is now hitting margins with increasing force—is crime. Not petty theft, but a steady, organized, and often repeatable pattern of intrusion that is costing the industry billions each year.
What was once written off as jobsite shrinkage has evolved into a structured criminal activity targeting construction as a soft, predictable opportunity.
A Billion-Dollar Problem Hiding in Plain Sight
The scale of construction-related crime is significant, even if it remains underreported.
Data from the National Equipment Register and the National Insurance Crime Bureau shows that construction equipment theft alone accounts for between $300 million and $1 billion annually in the United States. More than 11,000 pieces of equipment are stolen each year, and recovery rates hover at just 20 to 25 percent. Once stolen, equipment is often quickly resold, dismantled, or moved across jurisdictions, making recovery difficult and, in many cases, unlikely.
Copper theft adds another layer of loss that is both financially and operationally disruptive. The U.S. Department of Energy estimates that copper theft costs the U.S. economy approximately $1 billion annually. Construction sites, with exposed wiring and incomplete infrastructure, are among the most frequent targets. The damage extends well beyond the value of the material itself, often requiring extensive rework and creating safety risks that can significantly delay projects.
Taken together, these figures point to a simple conclusion: construction crime is not occasional—it is embedded in the operating environment.
$1 BILLION
Copper Theft
Estimated annual cost to the US economy.
What Thieves Are Targeting—and Why
The range of stolen assets reflects both market demand and ease of access. Heavy equipment such as skid steers, mini excavators, and loaders remain prime targets due to their high resale value and mobility. According to the National Equipment Register, compact equipment is particularly vulnerable because it can be transported quickly and often lacks robust tracking.
At the same time, copper wiring and electrical infrastructure have become the most aggressively targeted materials. Thieves frequently strip sites overnight, cutting and removing wiring in ways that cause extensive collateral damage. The U.S. Department of Energy has noted that copper theft often results in service disruptions and safety hazards, amplifying costs far beyond the value of the stolen metal.
Smaller but more frequent losses come from tools, materials, and fuel. Insurance providers such as Great American Insurance Group report that tools and handheld equipment are among the most commonly stolen items. These incidents often fall below insurance deductibles, meaning contractors absorb the losses directly. Building materials like lumber and steel are also increasingly targeted, particularly during periods of high demand or constrained supply. Diesel fuel theft has quietly grown as well, driven by ease of access and immediate resale value.
The pattern is clear: anything that can be removed quickly and converted into cash is at risk.
The Rise of Organized Construction Crime
Perhaps the most important shift in recent years is the growing role of organized crime.
Law enforcement agencies and the National Insurance Crime Bureau increasingly point to coordinated crews rather than opportunistic individuals. These groups operate with planning and precision. They scout sites during working hours, identify high-value targets, and return after hours equipped with trailers and tools to execute theft efficiently.
The timing is consistent. Most incidents occur overnight or on weekends when sites are unoccupied. In many cases, there is little evidence of forced entry, suggesting familiarity with site layouts and access points. Some sites are hit multiple times, indicating that once a vulnerability is identified, it is exploited repeatedly.
Construction sites, in effect, have become predictable supply points in a broader criminal logistics chain.
The Real Cost: Beyond What’s Stolen
The financial impact of construction crime extends well beyond the value of stolen assets.
According to loss control guidance from Great American Insurance Group, the true cost of theft can reach two to three times the initial loss when factoring in project delays, labor disruptions, reordering materials, and potential contractual penalties. Industry estimates suggest that theft can add between one and five percent to total project costs, a significant erosion of already tight margins.
Compounding the issue, many losses fall within insurance deductibles or result in higher premiums after claims are filed. The financial burden, in many cases, sits squarely with the contractors.
Law Enforcement and Policy Response
Law enforcement agencies have taken steps to address construction-related crime, but the response remains uneven.
The National Insurance Crime Bureau emphasizes the importance of rapid reporting and accurate equipment identification, noting that delays significantly reduce the likelihood of recovery. However, inconsistent use of serial number tracking and asset registration continues to limit effectiveness.
Copper theft has prompted more aggressive legislative action in some jurisdictions, including felony classifications and stricter oversight of scrap metal recyclers. Even so, enforcement varies widely, and resale markets remain a critical vulnerability in the system.
The reality is that law enforcement is often reacting to crime that is already well-organized and financially motivated.
The Security Gap: Temporary Sites, Persistent Risk
At the core of the issue is a structural challenge. Construction sites are temporary by nature, but the risks they face are constant.
They are frequently left unattended overnight, protected by minimal perimeter controls, and managed by a mix of general contractors, subcontractors, and suppliers with varying levels of accountability for security. This fragmentation creates gaps that are easily identified and exploited.
From a criminal perspective, the equation is straightforward: high-value assets, low barriers to entry, and limited risk of detection.
A Shift Toward Active Perimeter Security
Leading construction firms are beginning to rethink this model.
Rather than treating security as an afterthought, they are adopting a more proactive, layered approach. Mobile surveillance systems are being deployed to provide real-time visibility, often powered by solar units that can be rapidly installed on remote sites. Access control measures are being introduced on larger projects to better manage who enters and exits the site, reducing both external and insider threats.
GPS tracking and telematics are gaining traction for heavy equipment, enabling geofencing and rapid response if assets are moved without authorization. Physical security measures are also being upgraded, with improved fencing, secured storage containers, and lighting designed specifically for deterrence.
Insurance providers are increasingly encouraging, and in some cases require these measures as part of risk mitigation strategies.
The Bottom Line
Construction crime is no longer a secondary concern. It is a predictable, measurable, and increasingly organized threat that directly impacts project costs and timelines.
Data from the National Equipment Register, the National Insurance Crime Bureau, the U.S. Department of Energy, and major insurers all point to the same conclusion: losses are significant, recovery is limited, and prevention remains inconsistent.
The reality is that criminals have adapted faster than the industry. Until construction companies address perimeter security as a core operational function—designed into the project from the outset rather than added as a reactive measure—the imbalance will drive losses higher.
NEWS FROM THE EDGE
ALTRONIX
Altronix showcased a new portfolio of networked power and data solutions at ISC West 2026 designed to enhance performance, streamline installations, and support critical infrastructure applications. Read more here.
ACOEM
Acoem showcased its acoustic threat detection technology at ISC West 2026, focused on accurate, real-time identification of security threats. Learn more.
DOORKING
Doorking showcased enhancements to its 2112 eVolve video entry system at ISC West, featuring cloud-based control, mobile access, and remote communication with visitors. Read more.
DORTRONICS
Dortronics showcased its NEW 48500-EZ Interlock Controller which is a single-board solution for interlocking two to five doors across one or two zones and features the ability to pair controllers for up to 10 doors across shared zones with centralized lockdown capabilities. Learn more.
INOVONICS
Inovonics publicly debuted its EN2242 Duress Card at ISC West 2026, a lightweight wearable panic device designed to enhance user comfort while delivering advanced wireless performance for life safety applications. Read the release.
MAGNASPHERE
Magnasphere showcased its range of high-security magnetic contacts and switches for commercial and critical infrastructure applications at ISC West 2026. Read more.
MILESTONE
Milestone expands Hafnia at NVIDIA GTC with synthetic data and Training-as-a-Service, enabling AI models to train beyond real-world limitations. Read the press release.
Milestone advances its open platform with a new XProtect App Platform and BriefCam engine, built for scalable, AI-native video analytics. Read more here.
Milestone and IQSIGHT release SmartSuite, a unified plugin suite that simplifies deployment and enhances real-time analytics within XProtect. Read more at this link.
NOONLIGHT
Noonlight upgrades its Verify API with AI person filtering and enhanced verification, delivering higher accuracy and faster, more informed response. Read the release.
ONVIF
ONVIF highlighted the value of open interoperability standards at ISC West 2026, enabling flexible, vendor-independent security systems. Read the press release.
SECURITY DOOR CONTROLS (SDC)
Security Door Controls (SDC) is showcasing its EntryControl™ AUTO Series door operators, delivering ADA-compliant, low-energy access for high-traffic entry points. Learn more.
RHOMBUS
Rhombus has introduced Recon, an autonomous mobile security platform designed to extend physical security coverage beyond fixed cameras with continuous, cloud-connected monitoring.
ZENITEL
Zenitel is highlighting the role of audio solutions in strengthening perimeter security, emphasizing improved situational awareness and proactive response in outdoor environments. Read more here.
PRODUCT / COMPANY SHOWCASE
The Altronix NetWaySP4TCW53 is a 4-port hardened 802.3bt PoE switch designed for outdoor and remote security deployments such as parking garages, campuses, perimeters, and transportation facilities. This unit is equipped with dual fiber ports for long distance applications and delivers up to 90W per port (360W total) to power the latest IP cameras, Illuminators, wireless access points, and other edge equipment. Integrated EBC48 rapid battery charging enables constant power with seamless backup during outages, charging 32AH batteries in under 8hrs. NetWaySP4TCW53 features a NEMA 4/4X, IP66-11 rated enclosure to accommodate backup batteries and embedded LINQ™ Network Management, allows users to remotely monitor power diagnostics, reduce service visits, and keep critical security systems operating 24/7. Where required, 115/230VAC or 277VAC input options also available. Backed by a Lifetime Warranty.
Asylon Robotics: Humans + Robots + AI = Security Redefined
Asylon Robotics is redefining perimeter security by combining humans, robotics, and AI. Through autonomous ground robots (DroneDog™), FAA-compliant aerial systems (Guardian™), and a 24/7 Robotic Security Operations Center, Asylon delivers scalable, cost-effective protection. Their turnkey service enhances coverage, fills the security labor gap, and provides real-time monitoring across critical infrastructure. With 260,000+ missions completed, industry leaders trust Asylon to modernize and strengthen perimeter defense. Visit www.AsylonRobotics.com to learn more.
Dortronics' 48500-EZ PLC Interlock Controller is a cost-effective solution for interlocking two to five doors with one or two zones, capable of controlling two independent interlocks. This single-board solution provides installers with complete control of all configuration options without the need for any software. The system is field-configured for door control, alarm response, security level, and interlock overrides, and accommodates traffic lights and violation alarms. The 48500-EZ Series works with access control systems, supports all door types, and can monitor external threat detection systems including tailgate alarms, metal detectors, and duress alarms with guard booth oversight to lockdown selected doors on command. Controllers can be paired to operate up to 10 doors from one to four zones with shared doors between zones. The 48500-EZ Series is ideal for air locks, clean rooms, sally ports, data centers, schools, jewelry stores, money rooms, and any facility where interlocking doors are critical to physical security.

The Inovonics Intrusion System is your gateway to the future of intrusion detection. It’s the first hybrid, cloud native enterprise-grade security platform combining proven Inovonics wireless technology with optional hardwired zone support. Built for commercial environments, it delivers reliable wireless performance, built-in cellular connectivity, and mobile app control in a single integrated system.
Learn more at www.inovonics.com.
Radar Motion Detector: #MSK-101-MM
The MSK-101 utilizes advanced radar technology to distinguish human movement from small animals or environmental interference (e.g., rain, snow), providing precise, reliable detection. Indoor or outdoor/ wall mount or ceiling mount FMCW radar intruder detector with two alarm outputs & 66 feet max coverage. Operating temp -40f degrees to +158f degrees (IP66 and IP68 rated). The perfect detector where long range isn’t required and false alarms are unacceptable.
Numerous applications: vehicle gate approach notification, blind exterior corners of facilities, man gate presence. K-Band/24ghz assures no reduction in coverage from snow or rain.
Programmable via app or laptop. Available with relay outputs or POE.
PureActiv® is an Autonomous Perimeter Protection Software featuring patented Geospatial AI-Boosted Video Analytics. It enhances security by using advanced machine learning to reduce false alarms from sensors and cameras while integrating seamlessly with existing systems. PureActiv® provides real-time intruder tracking, automated detection, and geospatial visualization for superior situational awareness. Its extended detection range cuts infrastructure costs by up to 30% and supports flexible deployment across edge, server, and cloud environments.
SDC’s Auto EntryControl low-energy swing door operators are designed for applications requiring ADA compliance or user convenience.
SDC’s operator is built with a state-of-the-art microprocessor-based unit that is self-tuning and self-learning while offering non-handed operation, full-mechanical stops, and a variety of interface options for sensors, push-plates, fire alarms and electrified locks.
It’s belt driven with a combination of gears and pulleys which requires less torque, less power, absorbs more abuse, and is quieter than other automatic door openers.


























