Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!
Physical SecurityVideo Surveillance

Surge Protection Planning Proves Essential in Security System Design

By Bill MacKenzie
storm-enews
July 25, 2017

Physical security planning and building system design are ever-evolving fields as technology continues to advance. The open architecture of physical security solutions, the availability of add-on software analytics (i.e. license plate recognition, people counting, etc.), the communication capabilities of building and life safety systems and the necessity for code compliance have all contributed to the complexity of system planning and design.

 

Surprisingly, often the design of security systems includes a weakness which is only revealed when it is too late – the absence of surge protection. When this flaw is discovered, irreparable or expensive damage has usually occurred due to power surges caused by any number of internal or external sources.

The expression, “fail to plan and plan to fail,” is very fitting when surge protection is missing from system design, and here are a few reasons why:

 

Prevention – It's easier to stop something from happening in the first place than to repair the damage after it has happened. For example, it’s obvious to anyone who has had to replace an engine that it’s a bad decision to try to save money by not changing the oil in your car. This same principle applies directly to surge protection for fire, building and security systems.

 

There are two types of situations where surge suppression devices are necessary to protect equipment. The first is a power spike, which occurs when electrical current suddenly rises for a short period of time – often less than a thousandth of a second. The second situation, which is more severe, occurs when there is a power surge. These can result from several different sources: faulty wiring, lightning strikes or a sudden change in electrical current; for example, when devices are turned on or off. Spikes can also easily enter data/telecom lines (i.e. phone, cable or satellite systems, local area networks <LAN>, etc.) just as they can electric power lines. The simple implementation of surge protectors, regardless of the source location, safeguards against over-voltage being absorbed by life safety and security devices so they continue operating as intended without interruption.

 

Costs – We’ve all heard stories about systems that have been damaged by lightning strikes – and the costs to repair or replace these systems can range from tens of thousands of dollars up to over $1 million. In one example we saw, a lightning strike not only destroyed an entire security system, but also jumped to the nearby IP network and destroyed a significant number of the connected laptops and other computing resources. Moreover, equipment and cabling are not the only costs. Some facilities must be evacuated when the fire alarm systems stop functioning. When security systems are out of service, the parking lots, doors, and secure areas need to be covered by temporary security officers at an additional cost. And, there is also a loss of productivity if staff is delayed by congestion and manual processes at entrances, or if their work equipment and/or work data is damaged or lost.

 

At the lowest price points, surge protection devices absorb the excess energy on the line to save the protected systems. Higher quality devices can absorb multiple hits and remain operational. Some surge protection devices have the capability to alert operations staff that they have performed their function and may need to be checked or replaced to maintain protection. This is the best approach, because staff may not be aware of recent power surges and thus that the protection may be compromised.

 

Reliability –  Surge protectors are designed for specific voltage levels and circuit configurations and a surge current rating typically determines its level of protection. It’s important to note that simply having a surge protector doesn’t guarantee the safety of your equipment. The surge protector needs to be strong enough to handle the regular surges and spikes in your application. Guidelines established by the National Lightning Safety Institute state, “Only surge protection that is properly sized and grounded can be successful in preventing equipment damage.”

 

As improbable as it might seem, many security professionals do not realize that power strips and surge protectors are distinctly different products and will install a power strip thinking they are protecting their system. A power strip is essentially an extension cord with multiple plug receptacles. When numerous devices with high voltage requirements are plugged into a single power strip, they pose a potential fire hazard and can stop working without warning. A surge protector, on the other hand, prevents power surges from damaging equipment by diverting excess voltage to ground.

 

Designing surge protection into a new system is easy and affordable, and it is also easy to add protection to existing systems before any further damage occurs. Implementing a surge protection strategy during the planning process – or after – is the best way to be sure you are exercising prevention to help avoid an expensive cure.

 

KEYWORDS: business continuity security analytics security systems security technology

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Bill MacKenzie is a Regional Account Manager for DITEK Surge Protection.

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Neon human and android hands

65% of the Forbes AI 50 List Leaked Sensitive Information

The Louvre

After the Theft: Why Camera Upgrades Should Begin With a Risk Assessment

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

December 11, 2025

Responding to Evolving Threats in Retail Environments

Retail security professionals are facing an increasingly complex array of security challenges — everything from organized retail crime to evolving cyber-physical threats and public safety concerns.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Facing Compliance Challenges, Surveillance Proves Essential to Cannabis Industry Success - Security Magazine

    Facing Compliance Challenges, Surveillance Proves Essential to Cannabis Industry Success

    See More
  • Rows of cubicles

    Security design: Important points of protection in a building

    See More
  • Devil in Design Details: Documenting the Preliminary System Design

    See More

Related Products

See More Products
  • Physical Security and Environmental Protection

  • Physical Security and Safety: A Field Guide for the Practitioner

  • A Leaders Guide Book Cover_Nicholson_29Sept2023.jpg

    A Leader’s Guide to Evaluating an Executive Protection Program

See More Products
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing