Increase Security Not Complexity

Increase Security Not Complexity

Why many systems that integrate access control and video management do more harm than good

As any security officer will tell you, there’s a compelling reason for integrating access control with a video management system (VMS). Key cards and PINs are just the first line of defense against unauthorized access. Cameras trained on entry points provide visual verification, a second level of authentication, to confirm the identity of the person crossing the threshold.

The problems arise in the execution. Two separate displays arranged side-byside— one for access control and the other for the VMS—force the operator to divide his attention, leaving him struggling to synthesize data from two sources into a cohesive understanding of the event. The other problem arises when an access control display becomes too complex to manage when it pulls in a stream of video from the VMS associated with a door. Neither option is ideal because each requires the operator to sift through mountains of extraneous data, extract the information essential to a particular entry point and formulate an appropriate response—all in a matter of seconds. Over time, even great multitaskers find this mission completely overwhelming.

An important principle to keep in mind is the perception tunnel people experience under stress. Complex or nonessential product features that look appealing in the manufacturer’s demonstration become inaccessible and dangerously distracting under the stress of seeing someone on the “most wanted” list appear at your door. This is why law enforcement duty weapons have been stripped of useful addons like manual safeties and magazine lockouts. Even well-trained officers can be derailed by these features during the extreme stress of a shootout.

Where Typical Access Control-VMS Solutions Fall Short

Most combination systems in use deploy a single camera at the access point that is typically zoomed in on individual faces. The standard of keeping this tight viewpoint overlooks the possibility that there could be other individuals—possibly armed and dangerous—out of camera range ready to rush through the door once the first individual gets it open. To maintain adequate security, most facilities need multiple cameras.

A second shortcoming is found in the user interface. Most access control systems are quite complex, displaying a quantity of information that far exceeds what the security operator needs to know about a door event. Adding cameras to that environment makes the situation even worse because it adds a lengthy learning curve for operators, who may never fully master the system’s intricacies.

A third shortcoming is the inability to review video easily. Most combined systems present the operator with live video streaming. But if operators want to go back to look at recent history—perhaps something seemed just a little off about the event and they want to take a second look—it quickly becomes problematic. The interface simply isn’t designed to support that option.

Finding a Middle Ground

The key is to provide an uncomplicated integrated solution that boils down the security guard’s experience to just the essential elements: who’s coming through that particular door and what he should and can do about it. All the bells and whistles that supervisors or upper management might need—such as creating new key cards or a PIN, running statistical analysis or, in the case of a VMS, sophisticated analytics—should be stripped away to provide the frontline user with a simpler, more easily actionable version of the combined systems. A truly uncomplicated interface cannot be created by patching video images into the access control system or dragging some access control facilities into the VMS. Either would create a complexity that would be difficult, if not impossible, to master.

What’s necessary is a “middleware” program that can integrate the essence of access control and the essence of video management into a single, unified, easily understood screen.

The ideal system would allow the security guard to control door access and opening and locking mechanisms at will, as well as to see a list of the cameras associated with each entry point he’s monitoring. From the display, the guard would be able to call up any and all camera views—including current or recent history— as well as manipulate any pan/tilt/zoom features the cameras may possess. And most importantly, the interface would be so simple that the program would take 10 minutes or less.

As with today’s hybrid cars, such a program requires a great deal of complexity under the hood to make the operation appear so simple. If you had to stop to think about the conversion between gas and electricity every time you touched the accelerator, you’d be too distracted to drive the car. Mastering the art of simplicity is what’s going to make adoption of access control- VMS solutions really take off.

Nothing More, Nothing Less

A well-integrated access control-VMS solution aims to avoid presenting more information than necessary—thus averting decision paralysis—or presenting less information than necessary—which could lead responders off in the wrong direction because pertinent event data is missing. Marrying the essence of both systems while minimizing complexity for operators can raise security to a new level without taxing the human resources deployed as your frontline defense.

This article originally appeared in the November 2011 issue of Security Today.

Featured

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

  • Report: Cyber Attackers Continue to Turn to AI-Based Tools to Avoid Detection

    Comcast Business recently released its 2025 Cybersecurity Threat Report, a comprehensive analysis of 34.6 billion cybersecurity events detected between June 1,2024 and May 31, 2025. Now in its third year, the report offers business leaders a unique perspective into the evolving threat landscape and provides actionable insights to help organizations strengthen their defenses and align cybersecurity with business risk. Read Now

  • Axis Communications Creates AI-powered Video Surveillance Orchestra

    What if cameras could not only see the world, but interpret it—and respond like orchestra musicians reading sheet music: instantly, precisely, and in perfect harmony? That’s what global network technology leader Axis Communications set to find out. Read Now

  • Just as Expected

    GSX produced a wonderful tradeshow earlier this week. Monday was surprisingly strong in the morning, and the afternoon wasn’t bad at all. That’s Monday’s results and asking attendees to travel on Sunday. Just a quick hint, no one wants to give up their weekend to travel and set up an exhibit booth. I’m just saying. Read Now

    • Industry Events
    • GSX
  • NOLA: The Crescent City

    Twenty years later we finds ourselves in New Orleans. Twenty years ago the aftermath of Hurricane Katrina forced exhibitors and attendees to look elsewhere for tradeshow floor space. Read Now

    • Industry Events
    • GSX

New Products

  • PE80 Series

    PE80 Series by SARGENT / ED4000/PED5000 Series by Corbin Russwin

    ASSA ABLOY, a global leader in access solutions, has announced the launch of two next generation exit devices from long-standing leaders in the premium exit device market: the PE80 Series by SARGENT and the PED4000/PED5000 Series by Corbin Russwin. These new exit devices boast industry-first features that are specifically designed to provide enhanced safety, security and convenience, setting new standards for exit solutions. The SARGENT PE80 and Corbin Russwin PED4000/PED5000 Series exit devices are engineered to meet the ever-evolving needs of modern buildings. Featuring the high strength, security and durability that ASSA ABLOY is known for, the new exit devices deliver several innovative, industry-first features in addition to elegant design finishes for every opening.

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.