Lockdown!

Lockdown!

Advances in technology have made wireless locks a sound investment

Wireless locks are increasingly becoming the solution of choice in commercial facilities worldwide. Because of the levels of security and convenience they offer building owners, facility managers and occupants, it’s not uncommon for these systems to be expanded beyond the main facility and into areas such as parking garages and warehouses. As these systems are affordable and quick to install, the most difficult part of the process is often simply deciding which solution is best suited for a particular facility.

Advances in Technology

Recent advances in technology have eliminated many of the tradeoffs that wireless customers had to accept in the past. Latency was once the biggest challenge to wireless systems, preventing customers from managing their systems effectively and causing headaches for installers and integrators. But today’s wireless systems offer users the same options that were previously only available with a hardwired system, including bi-directional communication and access to real-time audit information.

Customers no longer have to deal with extended delays and latency as wireless systems now communicate in less than five to 10 seconds, practically real time. New systems have much lower power requirements that result in greater battery efficiencies, giving customers increased flexibility when managing their systems.

Recognizing the value of wireless solutions allows you to help your client secure doors that were traditionally difficult to run wires to in the past, and increase the security throughout their facility. A wireless solution also allows for a quicker installation that causes minimal disruption to their environment. Perhaps most important to your clients, a wireless installation is much faster than one that is wired, so the installation is quick and cost efficient.

Extending Access Control

As more businesses adopt electronic access control (EAC), there is a greater appreciation for the value it provides, namely, enhanced security, more efficient management and greater convenience.

In fact, now businesses are not only adding access control to their main facilities, but they’re asking security integrators how they can extend it to parking garages, warehouses, storage units and other buildings not connected to the main facility. Successfully extending the security perimeter to remote locations requires careful evaluation.

Limitations to extending access control include data transmission and potential costs. For starters, an extended access control security plan must address how information will be transmitted from the new security points back to the main server or controller.

The nature of the building environment and application of each respective access point being targeted will determine which type of system is appropriate. Most buildings have a dynamic environment, and, depending on the nature of activities within the building, the customer may need to consider more than one type of wireless solution. If a customer needs to be able to communicate remotely to an access point in real-time, they should consider the use of 900MHz or Bluetooth Low Energy (BLE). Both enable frequent bi-directional communication; however they generally require a wireless gateway of some type.

Alternatively, if the targeted application does not require real-time communication of access privilege changes and audits, a wireless offline solution such as Wi-Fi (2.4 GHz) may be appropriate. Access decisions are made at the door rather than at a host or access control panel. The door file gets into the lock through a Wi-Fi or wireless connection, but the lock is effectively offline. The door maintains all the information and updates the host and access control software on a periodic basis, perhaps once or twice a day.

Oftentimes, extending access control becomes a phase two or three initiative for a client. A client may know what they want, but the fiscal planning may occur over a period of time.

In those cases, it’s typically best to create a scalable plan that ensures the IT infrastructure and associated products are “future-proof.” Design an open platform system that will provide the end users with many options now and in the future, rather than locking them into a proprietary technology that forces them into a specific product or brand and another significant investment if they want to make changes.

Coordinate with IT

Another issue that must be considered during planning and something your clients may not have thought of is the demands access control will place on bandwidth and internal networks. In many companies, there remains a clear division between physical and cyber security departments with little interaction between the two.

While physical security managers may be slower to recognize and understand the potential significance of these demands, the best security systems integrators recognize the importance of involving IT from the beginning of a project, rather than as an afterthought. With EAC growing significantly in the marketplace, you’re likely to cross paths with IT now more than ever before. Taking a collaborative approach confirms that IT infrastructure is up-to-date and all products will be equipped to work in the future.

It’s important to remember, though, that not all wireless locks need to be networked to function effectively. Standalone wireless locks may be a good solution for some or all doors, depending on the scope of the installation, and are a good solution for clients who may not have the IT infrastructure to support a fully networked system.

Communication is Key

There are multiple options within the wireless market to help address what the customer is looking to do, but it’s important to have a strong understanding of their long term needs and goals as well as any special considerations or limitations. Be prepared to point out discrepancies between what they want versus what is actually needed.

A lower level of connectivity may be sufficient for some customers’ needs, while others might need to have real-time engagement with the access point. Understanding how your client is planning to utilize the respective openings in a building is the best guide in the selection of wireless solutions to deliver the targeted customer experience. And as always, make sure those solutions are backed by a reputable manufacturer who can provide the necessary support and service after installation.

This article originally appeared in the April 2016 issue of Security Today.

Featured

  • Report: 47 Percent of Security Service Providers Are Not Yet Using AI or Automation Tools

    Trackforce, a provider of security workforce management platforms, today announced the launch of its 2025 Physical Security Operations Benchmark Report, an industry-first study that benchmarks both private security service providers and corporate security teams side by side. Based on a survey of over 300 security professionals across the globe, the report provides a comprehensive look at the state of physical security operations. Read Now

    • Guard Services
  • Identity Governance at the Crossroads of Complexity and Scale

    Modern enterprises are grappling with an increasing number of identities, both human and machine, across an ever-growing number of systems. They must also deal with increased operational demands, including faster onboarding, more scalable models, and tighter security enforcement. Navigating these ever-growing challenges with speed and accuracy requires a new approach to identity governance that is built for the future enterprise. Read Now

  • Eagle Eye Networks Launches AI Camera Gun Detection

    Eagle Eye Networks, a provider of cloud video surveillance, recently introduced Eagle Eye Gun Detection, a new layer of protection for schools and businesses that works with existing security cameras and infrastructure. Eagle Eye Networks is the first to build gun detection into its platform. Read Now

  • Report: AI is Supercharging Old-School Cybercriminal Tactics

    AI isn’t just transforming how we work. It’s reshaping how cybercriminals attack, with threat actors exploiting AI to mass produce malicious code loaders, steal browser credentials and accelerate cloud attacks, according to a new report from Elastic. Read Now

  • Pragmatism, Productivity, and the Push for Accountability in 2025-2026

    Every year, the security industry debates whether artificial intelligence is a disruption, an enabler, or a distraction. By 2025, that conversation matured, where AI became a working dimension in physical identity and access management (PIAM) programs. Observations from 2025 highlight this turning point in AI’s role in access control and define how security leaders are being distinguished based on how they apply it. Read Now

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.

  • Luma x20

    Luma x20

    Snap One has announced its popular Luma x20 family of surveillance products now offers even greater security and privacy for home and business owners across the globe by giving them full control over integrators’ system access to view live and recorded video. According to Snap One Product Manager Derek Webb, the new “customer handoff” feature provides enhanced user control after initial installation, allowing the owners to have total privacy while also making it easy to reinstate integrator access when maintenance or assistance is required. This new feature is now available to all Luma x20 users globally. “The Luma x20 family of surveillance solutions provides excellent image and audio capture, and with the new customer handoff feature, it now offers absolute privacy for camera feeds and recordings,” Webb said. “With notifications and integrator access controlled through the powerful OvrC remote system management platform, it’s easy for integrators to give their clients full control of their footage and then to get temporary access from the client for any troubleshooting needs.”