Welcome back to Exit & Equity, the email for serious self storage owners.

Your gate logs reveal churn risks, security threats, and sales opportunities. Most operators never look. Here's what you're missing and how to fix it.

Let’s go!

&

IN THE KNOW

The 2 AM Problem You Don't Know You Have

You're reviewing last month's financials when your property manager mentions something odd: Unit 247 went delinquent three weeks ago, but the tenant keeps accessing the gate. Multiple times per week. Late at night.

You pull up the access logs, something you haven't done in months. Unit 247's access pattern tells a story:

January-March baseline: Two accesses per week, typically Saturday mornings around 10 AM.

April 1-14: Payment stops. Access continues, but the pattern shifts. Now it's Tuesday 11:47 PM, Thursday 2:13 AM, Saturday 1:38 AM, Monday 11:52 PM.

You cross-reference with your security cameras. The footage shows someone sleeping in the unit. Bedding. A hotplate. Personal items stacked against the walls. They've been living there for at least two weeks, maybe longer.

This actually happened to me. I caught it by accident while investigating a different issue. The access logs told the whole story but only because I happened to look.

Here's the problem: Your gate system collects this data automatically. Every entry. Every exit. Every failed attempt. Time stamped, account linked, pattern rich intelligence about what's actually happening at your facility. Most operators treat these logs like a legal compliance checkbox something to archive in case of a lawsuit, not operational intelligence.

The ROI math is straightforward. According to recent industry data, facilities implementing systematic access log analysis identify unauthorized occupancy 2-3 weeks earlier than manual inspection alone, detect churn risks 14-21 days before move-out, and respond to high-intent leads 5-10 minutes faster than competitors. The labor cost reduction from automated alerts alone runs 25-40% for comprehensive implementations, with ROI payback in 12-18 months.

You're already paying for the data collection. The gate system, the keypads, the cloud storage, it's all running. The question isn't whether to collect access logs. The question is whether you're going to look at them systematically or keep discovering problems weeks after they start.

Let me show you what you're missing.

What Access Logs Actually Tell You

Most operators think access logs answer one question: Who entered when?

That's the wrong frame. Access logs answer pattern questions, not individual event questions. Here's what you should be looking for:

Churn Risk Signals

A tenant who accessed their unit twice per week for eight months suddenly drops to zero visits over a two-week period. They're still paying—autopay is running—but they've stopped using the unit.

This is a leading indicator of churn. They haven't called to cancel yet, but the decision is already made. The unit isn't serving their needs anymore. They just haven't gotten around to moving out.

Industry data shows January renters. who tend to have more stable access patterns, consistently demonstrate lower early churn rates than summer move-ins. The difference isn't price sensitivity or seasonality. It's behavioral consistency. Tenants with stable, predictable access patterns (same days, similar frequency) stay longer. Tenants whose patterns become erratic or disappear entirely churn within 30-90 days.

Your access logs can identify this shift 14-21 days before the tenant calls to move out. That's two weeks to intervene with retention offers, flexible lease options, or unit downsizing. Strategies that retain 15-20% of flagged accounts according to vendor case studies.

The math: For a 100-unit facility with 5% annual churn, retaining just 5 additional units via early intervention generates $12,000-$18,000 in annual revenue. Implementation cost for churn monitoring automation? Roughly 3 hours of setup time plus $0-50/month for alert automation, depending on your existing software stack.

Unauthorized Occupancy Detection

The behavioral signature of someone living in a storage unit is distinctive:

  • Access after 10 PM and before 6 AM (consistent pattern, not occasional)

  • Daily or near-daily access (unlike typical storage customers who visit 1-3x per week)

  • Extended door-open times (20+ minutes vs. typical 5-10 minute access)

  • No daytime access pattern (avoiding detection during business hours)

Most facilities discover unauthorized occupancy through manual inspections, tenant complaints, or visible signs during routine walk-throughs. By that point, the tenant has been living there for weeks or months. The liability exposure is significant. Insurance claims, health/safety violations, potential legal action.

Access logs flag this pattern within 3-5 days of consistent late-night activity. Automated alerts can trigger video review, physical inspection, and intervention before the situation escalates.

Industry guidelines recommend daily log reviews for this exact reason, but actual operator behavior shows most facilities review logs monthly at best, or only reactively when investigating specific incidents. The gap between best practice and reality is where problems hide.

Security Incident Investigation

When theft or vandalism occurs, access logs function as an index to your security footage. Instead of reviewing 4+ hours of video to identify suspects, access logs pinpoint the exact timestamp:

  • Failed access attempts at 11:47 PM, 11:52 PM, 11:58 PM (someone testing codes)

  • Successful access at 12:03 AM (gained entry via shared code, master key, or bypass)

  • Exit at 12:47 AM (44 minutes on-site)

You're now reviewing 3-5 minutes of footage instead of hours. Suspect identification time drops from 2-3 days to under 30 minutes. Police response is faster. Evidence is clearer. Liability documentation is airtight.

This capability only works if your access control system and video surveillance have synchronized timestamps. Most modern systems handle this automatically, but older installations may require manual clock synchronization or NTP (network time protocol) configuration.

What Access Logs DON'T Tell You

Access logs are forensic tools, not prevention tools. They document what happened. They don't stop it from happening.

A comprehensive security strategy requires layers:

  • Access control (who can enter)

  • Surveillance cameras (visual verification)

  • Motion sensors (detection of unauthorized entry)

  • Lighting (deterrent and visibility)

  • Alarm systems (immediate incident notification)

Access logs sit at the intersection of these systems. They provide context. They answer questions. They accelerate investigation. But they don't replace physical security infrastructure.

Operators who invest heavily in gate keypads and access control software without pairing them with cameras and lighting are building a data collection system with no verification mechanism. You'll know someone entered at 2 AM. You won't know what they did or whether they should have been allowed in.

Is something off with your cash flow?

If your revenue looks fine, but you're always in reaction mode, you need to take the The Find Your Flow Assessment. It shows you exactly where money friction is occurring in your business and what to fix first. And it only takes five minutes.

Educational only.

The Access Patterns That Should Trigger Alerts

Not every anomaly is a problem. Not every pattern break requires intervention. The difference between useful automation and alert fatigue is knowing which signals matter.

🚨 Delinquent Account + Active Access

  • Trigger condition: Account payment status = 14+ days overdue AND access granted within past 7 days

  • Why it matters: Tenant is using the unit but not paying—possible dispute, forgotten payment method, or intentional avoidance

  • Action: Auto-notify facility manager + flag for follow-up call ("We noticed you've been accessing your unit but payment is overdue—everything okay?")

  • False positive rate: Low (5-10%)—this combination is almost always intentional

  • Implementation difficulty: Easy (requires PMS integration with access control)

🌙 Late-Night Access (Consistent Pattern)

  • Trigger condition: Access between 10 PM-6 AM on 3+ consecutive days OR 5+ times within 14-day period

  • Why it matters: Primary indicator of unauthorized occupancy

  • Action: Video review + physical inspection during business hours

  • False positive rate: Moderate (20-30%)—some tenants work night shifts, store restaurant inventory, etc.

  • Refinement: Exclude accounts with documented night-shift work; build multi-factor rule (late access + extended door-open time + daily frequency)

📉 Access Frequency Decline (Churn Warning)

  • Trigger condition: Weekly access count drops >50% compared to 4-week baseline AND account tenure >6 months

  • Why it matters: Leading indicator tenant no longer needs unit

  • Action: Outreach with retention offer ("Haven't seen you in a while—need a smaller unit?")

  • False positive rate: Moderate (25-35%)—vacations, seasonal storage, temporary access reduction

  • Refinement: Require 2-week sustained decline before triggering alert; exclude December-January (holiday travel season)

⛔ Failed Access Attempts (5+ Within 1 Hour)

  • Trigger condition: Repeated failed keypad entries from same account during business hours

  • Why it matters: Tenant forgot code; experiencing lockout frustration

  • Action: Auto-reset code + send new code via SMS + notify manager

  • False positive rate: Very low (<5%)

  • Implementation difficulty: Moderate (requires SMS integration + auto-reset capability)

The goal isn't zero false positives. The goal is high enough signal-to-noise ratio that staff acts on alerts instead of ignoring them.

The Data You're Collecting But Not Using

Most modern access control systems capture far more than entry/exit timestamps. They're collecting:

  • Battery diagnostics (low voltage warnings, power outage logs)

  • Failed vs. successful attempt ratios (security metric)

  • Door-open duration (behavioral data)

  • Access point identification (which gate, which door, which elevator)

  • Device type (keypad vs. mobile app vs. RFID vs. remote unlock)

You're paying for this data collection whether you use it or not. Storage costs are negligible. Analysis costs are near-zero if automated. The only cost is setup time—and that's a one-time investment.

What this data is worth (conservative estimates):

  • Churn early warning system: 15-20% retention improvement among flagged accounts = $12,000-18,000/year for 100-unit facility

  • Unauthorized occupancy detection: Catching squatters 2-3 weeks earlier = reduced liability exposure ($5,000-50,000 per incident avoided)

  • Lead response speed improvement: 25% conversion lift on high-intent leads = $5,600/month additional revenue (assumes 400 leads/month, $200 avg rent, 14-point conversion improvement)

  • Security incident investigation time: 90% reduction in video review time = $400-800 per incident (staff labor savings)

Aggregate annual value for a 100-unit facility implementing all four use cases: $50,000-100,000 in revenue retention, cost avoidance, and efficiency gains.

Implementation cost: $2,000-5,000 one-time (integration, automation setup) + $50-200/month ongoing (software, SMS, alert platform).

Payback period: 3-6 months.

This isn't hypothetical. These are real numbers from operator case studies and vendor-reported implementations. The ROI is documented. The only question is whether you'll act on it.

&

MAKE IT MODERN

Build Your Access Log Intelligence System

The Goal: Set up automated monitoring for 2-3 high-priority access patterns (unauthorized occupancy, churn warning, delinquent access) with real-time alerts to your phone or Slack. Time investment: 4-6 hours first-time setup. Ongoing: 10 minutes, 2x per week.

What You Need:

  • Existing gate/access control system (PTI, Nokē, SpiderDoor, Sensorberg, or similar)

  • Property management software (Storeganise, SiteLink, storEDGE, or equivalent)

  • Zapier account (free tier works for single facility; $20/month for 2-5 facilities) OR Make ($9/month)

  • Google Sheets or Airtable (free)

  • Optional: Twilio for SMS ($15/month) or Slack (free)

Step 1: Audit Your Current Access Log Capabilities (30 minutes)

Log into your gate system admin portal. Answer these questions:

  • Does it capture timestamps for every entry/exit?

  • Can you export access logs to CSV or Excel?

  • Does it integrate with your property management software?

  • Can it send webhooks or API calls when access events occur?

If your system can't export logs and doesn't have API access, you're stuck with manual review. Modern systems with API access start around $2,000-4,000 installed.

Step 2: Set Up Your Data Collection Pipeline (1-2 hours)

Option A: Native Integration (Easiest)

If your PMS and gate system already integrate (e.g., Yardi + StorLogix, Storeganise + PTI), turn on access log syncing in your PMS settings. Takes 15-30 minutes.

Option B: Zapier Automation (Most Flexible)

  1. Create a Zap: New Access Event → Add Row to Google Sheet

  2. Configure trigger: Select your gate system or use "Webhooks by Zapier"

  3. Map fields: Timestamp, Account ID, Unit Number, Access Point, Status

  4. Test with a manual gate entry

  5. Result: Every access event logs automatically

Time estimate: 45 minutes first time; 15 minutes once you know the process.

Option C: Manual Export (Lowest-Tech Fallback)

Export access logs weekly from your gate system. Paste into Google Sheets. Works for 1-2 facilities with <100 units but doesn't scale.

Step 3: Build Your Baseline (4-8 Weeks, Passive Collection)

Before setting up alerts, you need to know what "normal" looks like at your facility.

Create a simple baseline document:

  • Long-term tenants (6+ months): Access 1-2x per week, typically weekends 10 AM-2 PM

  • Short-term tenants (<3 months): Access 3-5x per week, variable timing

  • Business storage: Access weekdays 8 AM-6 PM, rarely weekends

  • Seasonal/student storage: Heavy August-September and May-June; light during semester

Step 4: Configure Your First Alert Rule (1 hour)

Start with the highest-ROI, lowest-false-positive pattern: Delinquent Account + Active Access

In Zapier:

  1. Create a Zap: New Row in Google Sheet (Access Log) → Filter → Check Payment Status in PMS → Send SMS if Delinquent

  2. Filter step: Only continue if Timestamp is within last 7 days

  3. PMS lookup step: Query account payment status by Account ID

  4. Condition: If payment status = "Overdue" AND days late >14

  5. Action: Send SMS to manager: "⚠️ Delinquent access: Account #[ID] (Unit [#]) accessed [Time]. Payment [X] days overdue."

Result: You get notified within minutes when a delinquent tenant accesses their unit.

False positive rate: <10%. This rule is highly reliable.

Step 5: Add Churn Early Warning (1 hour)

In Google Sheets:

  1. Create a pivot table: Account ID × Week × Count of Access Events

  2. Add a formula column: Week-over-week change percentage

  3. Flag accounts where: Current week access <50% of 4-week average AND account tenure >6 months

In Zapier:

  1. Create a scheduled Zap (runs weekly, Monday 9 AM)

  2. Action: Run Google Sheets query for flagged accounts

  3. Action: Send email to manager with list of at-risk tenants

Result: Every Monday, you get a list of 3-8 tenants whose access patterns suggest they're preparing to move out.

Response playbook:

  • Call tenant: "Haven't seen you at the facility recently—everything okay with your unit?"

  • Offer retention incentive: "If you need a smaller unit, we can move you at no charge"

  • Track retention rate: What percentage of flagged tenants stay after outreach?

Expected retention improvement: 15-20% of flagged accounts

Step 6: Set Up Late-Night Access Monitoring (1 hour)

This is your unauthorized occupancy early warning.

In Google Sheets:

  1. Filter access log: Show only events between 10 PM-6 AM

  2. Count: How many late-night accesses per account in past 14 days

  3. Flag: Any account with 5+ late-night accesses

In Zapier:

  1. Create a scheduled Zap (runs daily, 7 AM)

  2. Action: Query Google Sheets for accounts with 5+ late-night accesses in past 14 days

  3. Action: Send Slack message with list + video review prompt

Response playbook:

  1. Review security camera footage at flagged timestamps

  2. Look for: bedding, personal items, extended door-open times

  3. If confirmed: Inspect unit during business hours; initiate compliance process

False positive rate: 20-30% (night-shift workers, restaurant inventory). Refine by excluding known edge cases.

Step 7: Test, Refine, Scale (2 Weeks)

Week 1: Manual review of all alerts. Adjust thresholds if false positive rate >20%.

Week 2: Let automation run unsupervised. Monitor time savings.

Week 3+: Add additional rules (failed access attempts, lead response triggers).

Common Problems & Solutions:

  • Too many alerts → Tighten thresholds; require multi-factor rules

  • Zapier latency → Acceptable for most use cases; 15-30 minute delay is normal

  • PMS doesn't expose payment status → Manual weekly export; match in spreadsheet

  • Gate system doesn't send webhooks → Use scheduled Zaps (run every 4 hours)

Total Investment:

Setup: 4-6 hours first facility
Ongoing: 10 minutes, 2x per week
ROI: $50,000-100,000 annual value for 100-unit facility

Total Cost:

  • Zapier: $20/month (or $0 if free tier works)

  • SMS (optional): $15/month

  • Labor: 10 minutes, 2x per week = $50-100/month

Payback: First month.

The barrier isn't technical capability. It's not budget. It's not even time—total implementation takes 4-6 hours, ongoing maintenance is 20 minutes per week.

The barrier is deciding to look.

Most operators won't. They'll keep treating access logs as a compliance checkbox. They'll keep discovering squatters by accident, losing tenants without warning, and missing leads during peak inquiry windows.

You don't have to be most operators.

Start with one use case. Pick the highest-ROI pattern for your facility—probably unauthorized occupancy detection or churn early warning. Spend 4 hours this weekend setting up a basic alert rule.

My guess: You'll be surprised what's been hiding in your gate logs all along.

The data's been there the whole time. The question is what you're going to do about it.

P.S. — What's the weirdest pattern you've found in your access logs when you actually looked? Reply and let me know. I'm collecting operator stories about what gate data revealed—the more unusual, the better.

&

BEFORE YOU GO

Links I found interesting this week

  • Retiring owners has long been a great target market - [link]

  • A grounded approach to occupancy is always welcome [link]

  • I’m so intrigued by the intersection of storage and flex space [link]

&

FROM THE STOICS

If you would not be a man of no account, be a watchman at your own gates.

— Epictetus

How did you like today's newsletter?

Login or Subscribe to participate

Keep Reading

No posts found