Lightning protection for access control

November 2006 IT infrastructure

Transient voltage surges, including ­lightning-related activity, cause ­companies hundreds of thousands – sometimes even millions – of rands in damage per month.

These costs will definitely increase in the years to come as our dependability on microprocessor-based electronic equipment grows.

The ANSI/IEEE-C62 definition states that transients are brief but very powerful overvoltages and currents lasting up to 100 microseconds and often reach levels of 20 kV. In extreme events, these levels may reach in excess of 100 kV.

Transients and lightning strikes are generated from sources both inside and outside a building. Internal conditions account for over 80% of the generated transients from load switching and electrical/electronic equipment operation or equipment switching on and off. These transients are of much lower voltages than external sources, however they tend to be much more frequent and may occur several hundred thousand times an hour in industrial environments.

Transients are by far the single most destructive, costly and common power related occurrence. A single high-energy transient can destroy multiple pieces of equipment and take an entire site down for extended periods of time. The loss of revenue can add up very quickly.

External sources, include lightning and power system faults/failures, account for the other 20% of the overall transient problems. These are the general source of major damage with burnt-out equipment such as computers, controllers, readers, etc, being the result.

Whether a catastrophic lightning strike or the cumulative damage built up over time, among the equipment exposed to these transients are proximity card readers controllers, Dallas ibutton reader controllers, relays for electromagnetic locks, power supplies, control panels and the like.

In severe locations it is imperative to protect the mains supply to the controllers/PC as well as the signal lines on both sides from the control panel outwards and at the reader side inwards. Surge protection equipment is inexpensive at the outset and will save both the end-user and the systems integrator a great deal of time, money and downtime.

Very often, equipment repair and replacement costs will pale in comparison to the cost of extended downtime and the associated risks of the access control systems, intruder detection equipment, CCTV systems and fire protection systems being inoperable.

For more information contact Earle Wainstein, Powerhouse International, +27 (0) 11 440 2061, earle@powerhouse-sa.com




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Double dose of storage security
August 2019 , Products, IT infrastructure
The integration of InfiniBox and SafeNet KeySecure platforms brings data-at-rest encryption together with centralised logging, auditing capability.

Read more...
How far are we really at with artificial intelligence?
August 2019, Axis Communications SA , Editor's Choice, CCTV, Surveillance & Remote Monitoring, IT infrastructure, Residential Estate (Industry)
Justin Ludik unpacks exactly how far AI has come and what it potentially can do for society and more importantly, surveillance.

Read more...
Collaboration and tech key to safer, connected communities
August 2019 , Residential Estate (Industry), IT infrastructure
The advent of fibre-to-the-home has not only changed the way we work and play but has also heralded the launch of a number of advances for the security industry.

Read more...
Cyber tools and solutions
August 2019, Technews Publishing , Editor's Choice, Cyber Security, IT infrastructure, Residential Estate (Industry)
Hi-Tech Security Solutions looks at the various options we have when it comes to protecting yourself from the ever-growing scourge of cybercrime?

Read more...
Security solution for SD WAN
August 2019 , IT infrastructure
As thousands of African companies start to investigate and/or deploy SD WAN solutions, one consistent question arises: what are the security implications?

Read more...
Cloud advantage or cost?
August 2019 , Cyber Security, IT infrastructure
No matter how you look at it, security in the cloud is as important as security in traditional data centres.

Read more...
Integrated risk management essential
August 2019, AVeS Cyber Security , IT infrastructure, Security Services & Risk Management, Industrial (Industry)
With manufacturing focused intensively on innovation, combined with a reliance on connected networks and products, it is highly vulnerable to cyberattacks.

Read more...
Data protection more challenging
July 2019 , Editor's Choice, IT infrastructure
The number of businesses unable to recover data after an incident nearly doubled from 2016, according to the Global Data Protection Index surveying 2 200 IT decision makers from 18 countries.

Read more...
Four essential cloud security concepts
July 2019 , Cyber Security, IT infrastructure
Security is a critical a component of any cloud environment, but to be effective, it needs to be as agile and dynamic as the cloud infrastructure being protected.

Read more...
The world’s tiniest TPM
July 2019 , IT infrastructure, Industrial (Industry)
The Trusted Computing Group (TCG) launched a new project to create the 'world’s tiniest Trusted Platform Module (TPM)'.

Read more...