Access Control

The Changing Face of Access Control

Robust security systems include maintenance and monitoring

A small high-tech company wants stronger and more robust access control system to help protect trade secrets, but they don't want the responsibility of installing, monitoring and maintaining a system.

Another growing transportation company doesn't want to own or maintain the access servers but still wants to be able to control data entry, such as updating, adding and deleting employee information and ID badges.

Meanwhile, a financial services firm with a strong IT department and a wireless network wants to control all aspects of its access system.

These are examples of the three types of access control systems available to end users—managed services, hosted and traditional. Each has a place that is determined by the end user's specific needs and capabilities.

Here's a look at the advantages of each type of system.

Managed Access Control

This option makes sense for any size organization that needs access control—from a single-door to an enterprise system. The end user benefits from a system that requires no time commitment from its employees. A vendor provides the installation of all card readers, control panels and system servers, which reside offsite at the vendor's location. All data entry, such as the addition and deletion of employee identification badges, is managed by the vendor.

Vendors also provide monitoring and maintenance of the system and customized reports on a daily, weekly or monthly basis.

At a time when many organizations are choosing to outsource legal, payroll and other professional services, the outsourcing of access control makes sense. It lets an end user's organization focus on what it does best. Providers of managed services can generally supply an end user with a more robust access control system—most often at a lower cost.

Hosted Access Control

Much like the managed option, hosted access control involves a vendor providing an offsite server, along with the installation and maintenance of the control panel and card readers. But with hosted access co ntrol, the end user is responsible for data entry and access control application monitoring.

This access control option appeals to end users who don't want the responsibilities that come with system ownership but have the staff available for maintaining databases and monitoring the system for access control events and alarms.

Traditional Access Control

With a traditional access control system, end users purchase the control panel, readers, servers and software to operate and monitor the system and maintain the database. They may choose to service the system on their own or, more likely, sign a maintenance agreement with a system integrator.

None of these types of systems is the right choice in every situation. There are other factors that come into play—for example, the organization's IT department. The IT folks often carry significant weight with C-level executives and are known to be fiercely protective of their networks. Another major consideration is an organization's current, or legacy, system. A company may have already spent hundreds of thousands of dollars on access control equipment and would not want to scrap it all for a new system.

New Additions to the Arsenal

Over the past few years, an organization's IT department has become increasingly involved in decisions regarding physical security. The main reason for this shift is most security functions now require a computer network to transmit data, either from a video surveillance or access control system. Video consumes a lot of network bandwidth, while the network space required to transmit data from an access system is relatively minor.

Still, the IT staff will want to know what is being sent across its network and be assured that it is safe from outside hackers. This is where the convergence of logical and physical security comes into play. Often, IT requires multiple authentications before gaining access to an office or the network. Previously, a username and password were acceptable. Now, IT may require another security layer, such as biometrics.

Fingerprint scanners are the most frequently used biometric devices. Although they have been around for years, recent improvements in the reliability of biometric devices, combined with lower costs, have driven heightened interest in, and increased spending on, biometric technologies.

Edge readers are devices that sit on the network at the location of an entry. These are not only readers but also controllers, which are great for use at smaller or remote locations. Faster computer processors and less expensive memory chips are the driving forces behind these devices.

Wireless readers are becoming very popular as they are perfect for use at remote sites or where cabling or drilling is difficult or impossible, such as in historic buildings.

Wireless, card-reading locksets allow for the installation of cylinder locks into file cabinets and desk drawers that may contain sensitive documents. The locksets are accessed by smart cards that can restrict who may open the drawers and when.

As for making the switch from legacy systems, access control equipment manufacturers are making transition readers that can read multiple card technologies.

These readers allow organizations to integrate new, modern equipment without having to completely replace an existing access system. The way we provide access control is changing rapidly. That change will only accelerate as technology evolves and the need for access control grows.

Featured

  • Gaining a Competitive Edge

    Ask most companies about their future technology plans and the answers will most likely include AI. Then ask how they plan to deploy it, and that is where the responses may start to vary. Every company has unique surveillance requirements that are based on market focus, scale, scope, risk tolerance, geographic area and, of course, budget. Those factors all play a role in deciding how to configure a surveillance system, and how to effectively implement technologies like AI. Read Now

  • 6 Ways Security Awareness Training Empowers Human Risk Management

    Organizations are realizing that their greatest vulnerability often comes from within – their own people. Human error remains a significant factor in cybersecurity breaches, making it imperative for organizations to address human risk effectively. As a result, security awareness training (SAT) has emerged as a cornerstone in this endeavor because it offers a multifaceted approach to managing human risk. Read Now

  • The Stage is Set

    The security industry spans the entire globe, with manufacturers, developers and suppliers on every continent (well, almost—sorry, Antarctica). That means when regulations pop up in one area, they often have a ripple effect that impacts the entire supply chain. Recent data privacy regulations like GDPR in Europe and CPRA in California made waves when they first went into effect, forcing businesses to change the way they approach data collection and storage to continue operating in those markets. Even highly specific regulations like the U.S.’s National Defense Authorization Act (NDAA) can have international reverberations – and this growing volume of legislation has continued to affect global supply chains in a variety of different ways. Read Now

  • Access Control Technology

    As we move swiftly toward the end of 2024, the security industry is looking at the trends in play, what might be on the horizon, and how they will impact business opportunities and projections. Read Now

Featured Cybersecurity

Webinars

New Products

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening. 3

  • 4K Video Decoder

    3xLOGIC’s VH-DECODER-4K is perfect for use in organizations of all sizes in diverse vertical sectors such as retail, leisure and hospitality, education and commercial premises. 3