Ask the Experts: John Krumme and Jack VanDenBerg

This month’s experts discuss managed service, a new option for access control

An unmanned utility site located 50 miles from company headquarters, a small office for a sole law practitioner located in the middle of a downtown block and a medical facilities warehouse that employs 200 people have one thing in common: they need access control.

ISSUE: What are some of the newest options for facilities needing access control?

SOLUTION: Instead of a traditional access control system in which the end user is responsible for the operation and maintenance of the system, many organizations are now realizing the value of outsourcing, known as hosted access control. Rather than dedicate their own time, or that of employees, those charged with protecting businesses are choosing managed access services.

In this arrangement, a third-party vendor—usually a system integrator —installs readers and control panels, provides cards and populates the database with employee information. System servers and software reside offsite at the vendor's location. The vendor monitors and maintains the system while providing customized daily, weekly or monthly reports to meet the end user's needs.

By outsourcing their access control needs, many organizations can get a more robust system that often costs no more than a traditional user-operated system.

Another major benefit of hosted services is the provider's ability to offer remote diagnostics. Through constant monitoring of the system, the provider can immediately spot hardware or software problems and make corrections remotely. This can be very valuable when remote sites require significant travel time.

Hosted systems also can integrate with cameras to provide video of alarms and can remotely lock and unlock doors at times defined by the end user. During an emergency situation, especially at a college or university, this can help with an immediate lockdown of campus buildings.

ISSUE: In what other ways is hosted access control useful?

SOLUTION: Those end users with the staff to handle day-to-day database maintenance may choose a slight variation of managed access services. The provider installs onsite equipment and maintains the server and software at its location, but the end user is responsible for card additions and deletions as employees are hired and terminated.

In both case, end users are able to make use of new access technologies such as biometrics, wireless readers and edge reader/controllers. And hosted systems allow for end users to check in on the operation of the system, either onsite or remotely over a secured Internet connection at any time.

These access control options may not be the right choice for every end user. Organizations with fully staffed physical security departments may opt for a traditional system in which the user retains full responsibility for operation and maintenance.

READER QUESTION: My wife and I recently opened a 12-room bed-and-breakfast inn and spent a lot of money on remodeling. Now we want to add some security equipment—maybe a small camera system—to cover our parking lot, lobby and dining area. Can that be done without significantly demolishing our beautifully restored inn or inconveniencing our guests?

SOLUTION: Consider the layout of your inn, the type of memory storage and DVR access you're looking for, the location of the DVR and monitor, and the view you want from your cameras.

Consider a DVR with remote Internet access and plenty of storage capacity, as well as the ease to store captured images to an external memory stick or CD. The remote access will allow you to view a current or recorded image from a different location without having to be on site. Choosing the suitable amount of storage depends on how many days of storage you want and at what frame rate. The frame rate refers to fluidity of motion that you want to view; the more fluid the motion, the more storage it requires.

When choosing a camera, you need to decide on a few things: How will it be connected to the DVR? What view do you want, based on the location of the camera and what you want to see? What quality of picture do you desire?

The camera can be connected to the DVR either by hardwire or a wireless connection. Hardwiring requires some drilling through walls with exposed wire mounted with clips or in conduit. If you use a wireless connection, you have to take into consideration the building structure. Also keep in mind that wireless connections tend to be more expensive than hardwired.

The location of the camera may determine the quality of camera you choose. Also, consider what type of resolution, signal—either an analog or digital—and lens you desire.

You also may want to consider a stand-alone locking system for each door. SALTO Systems provides a wireless access control system at an affordable price for this type of application.

Featured

  • Maximizing Your Security Budget This Year

    Perimeter Security Standards for Multi-Site Businesses

    When you run or own a business that has multiple locations, it is important to set clear perimeter security standards. By doing this, it allows you to assess and mitigate any potential threats or risks at each site or location efficiently and effectively. Read Now

  • New Research Shows a Continuing Increase in Ransomware Victims

    GuidePoint Security recently announced the release of GuidePoint Research and Intelligence Team’s (GRIT) Q1 2024 Ransomware Report. In addition to revealing a nearly 20% year-over-year increase in the number of ransomware victims, the GRIT Q1 2024 Ransomware Report observes major shifts in the behavioral patterns of ransomware groups following law enforcement activity – including the continued targeting of previously “off-limits” organizations and industries, such as emergency hospitals. Read Now

  • OpenAI's GPT-4 Is Capable of Autonomously Exploiting Zero-Day Vulnerabilities

    According to a new study from four computer scientists at the University of Illinois Urbana-Champaign, OpenAI’s paid chatbot, GPT-4, is capable of autonomously exploiting zero-day vulnerabilities without any human assistance. Read Now

  • Getting in Someone’s Face

    There was a time, not so long ago, when the tradeshow industry must have thought COVID-19 might wipe out face-to-face meetings. It sure seemed that way about three years ago. Read Now

    • Industry Events
    • ISC West

Featured Cybersecurity

Webinars

New Products

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • Compact IP Video Intercom

    Viking’s X-205 Series of intercoms provide HD IP video and two-way voice communication - all wrapped up in an attractive compact chassis. 3

  • A8V MIND

    A8V MIND

    Hexagon’s Geosystems presents a portable version of its Accur8vision detection system. A rugged all-in-one solution, the A8V MIND (Mobile Intrusion Detection) is designed to provide flexible protection of critical outdoor infrastructure and objects. Hexagon’s Accur8vision is a volumetric detection system that employs LiDAR technology to safeguard entire areas. Whenever it detects movement in a specified zone, it automatically differentiates a threat from a nonthreat, and immediately notifies security staff if necessary. Person detection is carried out within a radius of 80 meters from this device. Connected remotely via a portable computer device, it enables remote surveillance and does not depend on security staff patrolling the area. 3