Lightning protection for access control

Access & Identity Management Handbook 2006 Infrastructure

Transient voltage surges, including ­lightning-related activity, cause ­companies hundreds of thousands – sometimes even millions – of rands in damage per month.

These costs will definitely increase in the years to come as our dependability on microprocessor-based electronic equipment grows.

The ANSI/IEEE-C62 definition states that transients are brief but very powerful overvoltages and currents lasting up to 100 microseconds and often reach levels of 20 kV. In extreme events, these levels may reach in excess of 100 kV.

Transients and lightning strikes are generated from sources both inside and outside a building. Internal conditions account for over 80% of the generated transients from load switching and electrical/electronic equipment operation or equipment switching on and off. These transients are of much lower voltages than external sources, however they tend to be much more frequent and may occur several hundred thousand times an hour in industrial environments.

Transients are by far the single most destructive, costly and common power related occurrence. A single high-energy transient can destroy multiple pieces of equipment and take an entire site down for extended periods of time. The loss of revenue can add up very quickly.

External sources, include lightning and power system faults/failures, account for the other 20% of the overall transient problems. These are the general source of major damage with burnt-out equipment such as computers, controllers, readers, etc, being the result.

Whether a catastrophic lightning strike or the cumulative damage built up over time, among the equipment exposed to these transients are proximity card readers controllers, Dallas ibutton reader controllers, relays for electromagnetic locks, power supplies, control panels and the like.

In severe locations it is imperative to protect the mains supply to the controllers/PC as well as the signal lines on both sides from the control panel outwards and at the reader side inwards. Surge protection equipment is inexpensive at the outset and will save both the end-user and the systems integrator a great deal of time, money and downtime.

Very often, equipment repair and replacement costs will pale in comparison to the cost of extended downtime and the associated risks of the access control systems, intruder detection equipment, CCTV systems and fire protection systems being inoperable.

For more information contact Earle Wainstein, Powerhouse International, +27 (0) 11 440 2061, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Local-first data security is South Africa's new digital fortress
Infrastructure Information Security
With many global conversations taking place about data security and privacy, a distinct and powerful message is emerging from South Africa: the critical importance of a 'local first' approach to data security.

Read more...
Software security is a team sport
Information Security Infrastructure
Building and maintaining secure software is not a one-team effort; it requires the collective strength and collaboration of security, engineering, and operations teams.

Read more...
Data resilience at VeeamON
Technews Publishing SMART Security Solutions Infrastructure Information Security
SMART Security Solutions attended the VeeamON Tour in Johannesburg in August to learn more about data resilience and Veeam’s initiatives to enhance data protection, both on-site and in the cloud.

Read more...
Troye exposes the Entra ID backup blind spot
Information Security Infrastructure
If you trust Microsoft to protect your identity, think again. Many organisations naively believe that Microsoft’s shared responsibility model covers Microsoft Entra?ID – formerly Azure AD – but it does not.

Read more...
Secure data protection without hardware lock-in
Infrastructure Information Security News & Events
New Veeam Software Appliance empowers IT teams to achieve instant protection with Veeam’s fully preconfigured, software-only appliance, delivering enterprise-ready simplified deployment and operational efficiency, robust cyber resilience.

Read more...
Hytera supports communication upgrade for Joburg
News & Events Infrastructure Government and Parastatal (Industry)
By equipping Johannesburg’s metro police and emergency services with multimode radios which integrate TETRA and LTE networks, Hytera is bridging coverage gaps and improving response times across the city.

Read more...
Combining TETRA or DMR with 5G broadband
Infrastructure IoT & Automation
As enterprises face rising complexity and connectivity demands, hybrid networks offer a transformative path, combining the proven reliability of TETRA or DMR with the innovation and coverage of 5G broadband.

Read more...
Questing for the quantum AI advantage
Infrastructure AI & Data Analytics
The clock is ticking down to the realisation of quantum AI and the sought-after ‘quantum advantage’. In many boardrooms, however, quantum remains mysterious; full of promise, but not fully understood.

Read more...
The growing role of hybrid backup
Infrastructure Information Security
As Africa’s digital economy rapidly grows, businesses across the continent are facing the challenge of securing data in an environment characterised by evolving cyberthreats, unreliable connectivity and diverse regulatory frameworks.

Read more...
IoT-driven smart data to stay ahead
IoT & Automation Infrastructure AI & Data Analytics
In a world where uncertainty is constant, the real competitive edge lies in foresight. Businesses that turn real-time data into proactive strategies will not just survive, they will lead.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.