Your staff, students, and visitors want to work, study, and visit in confident safety.

While some organizations have a secure perimeter, others are wide open. Security options may vary, but voice communication is always possible.

Secure Perimeters

When the perimeter is secure, usually with a fence and perimeter intrusion detection system, visitors and employees are funneled through specific entrances and exits. This limits the areas where communication may be required. Intercom stations can be placed at gates for visitors to request access and employees to obtain assistance.

Voice communication may also be used when abnormal activity is detected around the fence. The security team may use speakers around the perimeter to deliver warning messages to potential intruders or directions to lost visitors.

Unsecure Perimeters

Without a fence, campus access is uncontrolled. Students, or those with normal business needs, can enter the area from any given point. This type of uncontrolled entry requires that intercom stations, also known as emergency call phones, be placed in many more locations. When placed around an entire facility, intercom stations may be conspicuous with blue lights on top and painted in bright colors.

Walkways and Parking Decks

Walkways and parking areas may be equipped with intercom stations as well. Gated parking lots benefit from intercom stations because they keep cars moving during an entry challenge, such as a lost credential while idling at the gate.

Building Entrance Doors

Intercoms may take the place of staff and security at entrance doors. Instead, staff inside the building or security officers at a command post may vet visitors remotely. When intercom substations are equipped with onboard video cameras, or integrated with nearby security cameras, security and staff may visually verify personnel and visitors.

The Right Partner

The goal of a security assessment and site survey is to help understand where potential threats may exist at schools, buildings, and campuses of all sizes. Ultimately, these solutions can help integrate a variety of technologies as part of a plan that works in unison to help secure occupants, protect valuable assets, and assist in preventing physical access to sensitive areas.