Access Control in the Midst of an IP Revolution

Given the prevalence of IP-enabled devices in video surveillance today, it is reasonable to surmise the adoption of network technology will follow a similar path in access control. However, the pace of innovation in the access control market tends to be much slower than the rest of the physical security industry. Access control systems—including panels, software, readers and other peripheral devices—can be highly proprietary and embedded within the organizations they serve, which may make it difficult to integrate with other systems.

The demand for IP-centric access control systems and a trend toward more ‘open’ solutions are having a distinct effect on the market. End users now realize the tremendous cost savings by implementing an IP-based access control system in which devices, such as door sensors and card/badge readers, connect directly to the network and work well with other systems.

One of the biggest reasons why more users are making the transition to a IP is because of advancements in locking technology, specifically with online and wireless locks. Online locks provide end users with various types of advanced functionality, such as remote system management and administration, and automatic alerts following alarm events. With access points becoming another piece of data to be analyzed in the evolving ‘Internet of Things’ technology landscape, the benefits of online locks are significant. Locks can be either wired or wireless depending on the need of the application or the user, increasing flexibility and return-on-investment (ROI). In places where running wire may be cost-prohibitive or where time is a crucial factor, wireless locks are a great alternative.

In addition to the evolution in technologies, however, there are also significant changes in the industry overall. IT departments are increasingly being tasked with making decisions about the security technology solutions being purchased, as well as how these devices will be implemented throughout the organization. According to a recent report from IHS, IT integrators and IT departments will play an increasingly large role in physical security deployments. And since access control can help flag anomalies in behavior, it too will be a critical component for helping IT departments protect physical and digital assets.

IT will continue to drive the industry towards tighter integrations between access control and other systems on the network. This applies not only to other security systems, but to building management systems and human resources software platforms, for example. Access control vendors will need to embrace open standards and ideas to ensure long-term scalability.

What if you could take an access control database and integrate it with other open software solutions, such as an event management system, so that users could not only use it for ingress and egress within a facility but also reserve a conference room for a designated time slot? That and other types of advanced capabilities are achievable today for those willing to think outside the box.

The access control market is and will continue to become more IP-based in the years to come. As businesses look to adapt their access control solutions to fit this, they will look closely at these new developments so as to not be left behind.

This article originally appeared in the August 2015 issue of Security Today.

About the Author

Mitchell Kane is the president of Vanderbilt Technologies.

Featured

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

  • Report: Cyber Attackers Continue to Turn to AI-Based Tools to Avoid Detection

    Comcast Business recently released its 2025 Cybersecurity Threat Report, a comprehensive analysis of 34.6 billion cybersecurity events detected between June 1,2024 and May 31, 2025. Now in its third year, the report offers business leaders a unique perspective into the evolving threat landscape and provides actionable insights to help organizations strengthen their defenses and align cybersecurity with business risk. Read Now

  • Axis Communications Creates AI-powered Video Surveillance Orchestra

    What if cameras could not only see the world, but interpret it—and respond like orchestra musicians reading sheet music: instantly, precisely, and in perfect harmony? That’s what global network technology leader Axis Communications set to find out. Read Now

  • Just as Expected

    GSX produced a wonderful tradeshow earlier this week. Monday was surprisingly strong in the morning, and the afternoon wasn’t bad at all. That’s Monday’s results and asking attendees to travel on Sunday. Just a quick hint, no one wants to give up their weekend to travel and set up an exhibit booth. I’m just saying. Read Now

    • Industry Events
    • GSX
  • NOLA: The Crescent City

    Twenty years later we finds ourselves in New Orleans. Twenty years ago the aftermath of Hurricane Katrina forced exhibitors and attendees to look elsewhere for tradeshow floor space. Read Now

    • Industry Events
    • GSX

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure.

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • Mobile Safe Shield

    Mobile Safe Shield

    SafeWood Designs, Inc., a manufacturer of patented bullet resistant products, is excited to announce the launch of the Mobile Safe Shield. The Mobile Safe Shield is a moveable bullet resistant shield that provides protection in the event of an assailant and supplies cover in the event of an active shooter. With a heavy-duty steel frame, quality castor wheels, and bullet resistant core, the Mobile Safe Shield is a perfect addition to any guard station, security desks, courthouses, police stations, schools, office spaces and more. The Mobile Safe Shield is incredibly customizable. Bullet resistant materials are available in UL 752 Levels 1 through 8 and include glass, white board, tack board, veneer, and plastic laminate. Flexibility in bullet resistant materials allows for the Mobile Safe Shield to blend more with current interior décor for a seamless design aesthetic. Optional custom paint colors are also available for the steel frame.