Lightning protection for access control

Access & Identity Management Handbook 2006 IT infrastructure

Transient voltage surges, including ­lightning-related activity, cause ­companies hundreds of thousands – sometimes even millions – of rands in damage per month.

These costs will definitely increase in the years to come as our dependability on microprocessor-based electronic equipment grows.

The ANSI/IEEE-C62 definition states that transients are brief but very powerful overvoltages and currents lasting up to 100 microseconds and often reach levels of 20 kV. In extreme events, these levels may reach in excess of 100 kV.

Transients and lightning strikes are generated from sources both inside and outside a building. Internal conditions account for over 80% of the generated transients from load switching and electrical/electronic equipment operation or equipment switching on and off. These transients are of much lower voltages than external sources, however they tend to be much more frequent and may occur several hundred thousand times an hour in industrial environments.

Transients are by far the single most destructive, costly and common power related occurrence. A single high-energy transient can destroy multiple pieces of equipment and take an entire site down for extended periods of time. The loss of revenue can add up very quickly.

External sources, include lightning and power system faults/failures, account for the other 20% of the overall transient problems. These are the general source of major damage with burnt-out equipment such as computers, controllers, readers, etc, being the result.

Whether a catastrophic lightning strike or the cumulative damage built up over time, among the equipment exposed to these transients are proximity card readers controllers, Dallas ibutton reader controllers, relays for electromagnetic locks, power supplies, control panels and the like.

In severe locations it is imperative to protect the mains supply to the controllers/PC as well as the signal lines on both sides from the control panel outwards and at the reader side inwards. Surge protection equipment is inexpensive at the outset and will save both the end-user and the systems integrator a great deal of time, money and downtime.

Very often, equipment repair and replacement costs will pale in comparison to the cost of extended downtime and the associated risks of the access control systems, intruder detection equipment, CCTV systems and fire protection systems being inoperable.

For more information contact Earle Wainstein, Powerhouse International, +27 (0) 11 440 2061,

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Accelerating global IoT deployment
October 2019 , IT infrastructure
Upcoming suite of Eseye products will deliver global IoT connectivity with near 100% coverage, automated onboarding and data provision into AWS IoT Core.

Digitising Maslow’s Hierarchy of Needs
October 2019 , Integrated Solutions, IT infrastructure
Mobile technology has the potential to change how Africa approaches patient and healthcare, says Phathizwe Malinga, managing director, SqwidNet.

Edge computing ? drivers and benefits
September 2019 , IT infrastructure
Edge computing brings bandwidth-intensive content and latency-sensitive applications closer to the user or data source.

Advanced connectivity enables fast and flexible networks
September 2019, Ruckus Networks , IT infrastructure
Advanced networking is the unsung hero of our digital future, offering a continuum of connectivity that can drive the development of new products and services and transform operating models.

A platform approach to innovation and value
CCTV Handbook 2019, Technews Publishing , Editor's Choice, CCTV, Surveillance & Remote Monitoring, Integrated Solutions, IT infrastructure
Moving to the platform model of doing business holds tremendous advantages for end users and smaller developers, but also for the whole technology supply chain.

Selecting the right surveillance storage
CCTV Handbook 2019, Capsule Technologies, Technews Publishing , Editor's Choice, CCTV, Surveillance & Remote Monitoring, IT infrastructure
Storage is an integral part of a surveillance installation and the solution chosen can make or break the success of your project.

The NUUO storage solution
CCTV Handbook 2019, Forbatt SA , CCTV, Surveillance & Remote Monitoring, IT infrastructure
A stable NVR should maintain a consistent data throughput unaffected by user actions such as querying or playback.

Keeping your things to yourself
October 2019, Technews Publishing , Editor's Choice, Cyber Security, Integrated Solutions, IT infrastructure
Three experts spoke to Hi-Tech Security Solutions to offer advice on keeping your IoT working for you and not for cyber criminals.

IoT in security
October 2019, Duxbury Networking, Technews Publishing , Editor's Choice, Cyber Security, Integrated Solutions, IT infrastructure
Using the Internet of Things is not really optional these days, but securing the Internet of Things is compulsory, no matter what industry you operate in.

The future of connectivity in South Africa
September 2019 , IT infrastructure, Products
Next-generation technologies will drive real transformation in companies. Organisations across all industries must prepare to enter the next phase of the digital future, says Matthew Hall, product director at Rectron.