Ask the Experts: John Krumme and Jack VanDenBerg

This month’s experts discuss managed service, a new option for access control

An unmanned utility site located 50 miles from company headquarters, a small office for a sole law practitioner located in the middle of a downtown block and a medical facilities warehouse that employs 200 people have one thing in common: they need access control.

ISSUE: What are some of the newest options for facilities needing access control?

SOLUTION: Instead of a traditional access control system in which the end user is responsible for the operation and maintenance of the system, many organizations are now realizing the value of outsourcing, known as hosted access control. Rather than dedicate their own time, or that of employees, those charged with protecting businesses are choosing managed access services.

In this arrangement, a third-party vendor—usually a system integrator —installs readers and control panels, provides cards and populates the database with employee information. System servers and software reside offsite at the vendor's location. The vendor monitors and maintains the system while providing customized daily, weekly or monthly reports to meet the end user's needs.

By outsourcing their access control needs, many organizations can get a more robust system that often costs no more than a traditional user-operated system.

Another major benefit of hosted services is the provider's ability to offer remote diagnostics. Through constant monitoring of the system, the provider can immediately spot hardware or software problems and make corrections remotely. This can be very valuable when remote sites require significant travel time.

Hosted systems also can integrate with cameras to provide video of alarms and can remotely lock and unlock doors at times defined by the end user. During an emergency situation, especially at a college or university, this can help with an immediate lockdown of campus buildings.

ISSUE: In what other ways is hosted access control useful?

SOLUTION: Those end users with the staff to handle day-to-day database maintenance may choose a slight variation of managed access services. The provider installs onsite equipment and maintains the server and software at its location, but the end user is responsible for card additions and deletions as employees are hired and terminated.

In both case, end users are able to make use of new access technologies such as biometrics, wireless readers and edge reader/controllers. And hosted systems allow for end users to check in on the operation of the system, either onsite or remotely over a secured Internet connection at any time.

These access control options may not be the right choice for every end user. Organizations with fully staffed physical security departments may opt for a traditional system in which the user retains full responsibility for operation and maintenance.

READER QUESTION: My wife and I recently opened a 12-room bed-and-breakfast inn and spent a lot of money on remodeling. Now we want to add some security equipment—maybe a small camera system—to cover our parking lot, lobby and dining area. Can that be done without significantly demolishing our beautifully restored inn or inconveniencing our guests?

SOLUTION: Consider the layout of your inn, the type of memory storage and DVR access you're looking for, the location of the DVR and monitor, and the view you want from your cameras.

Consider a DVR with remote Internet access and plenty of storage capacity, as well as the ease to store captured images to an external memory stick or CD. The remote access will allow you to view a current or recorded image from a different location without having to be on site. Choosing the suitable amount of storage depends on how many days of storage you want and at what frame rate. The frame rate refers to fluidity of motion that you want to view; the more fluid the motion, the more storage it requires.

When choosing a camera, you need to decide on a few things: How will it be connected to the DVR? What view do you want, based on the location of the camera and what you want to see? What quality of picture do you desire?

The camera can be connected to the DVR either by hardwire or a wireless connection. Hardwiring requires some drilling through walls with exposed wire mounted with clips or in conduit. If you use a wireless connection, you have to take into consideration the building structure. Also keep in mind that wireless connections tend to be more expensive than hardwired.

The location of the camera may determine the quality of camera you choose. Also, consider what type of resolution, signal—either an analog or digital—and lens you desire.

You also may want to consider a stand-alone locking system for each door. SALTO Systems provides a wireless access control system at an affordable price for this type of application.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation. 3