From Offline to Wireless

Combining networking options has never been simpler

Why, users ask, must they choose between offline and online solutions? If online, why must they choose between wired and wireless? Why must they isolate technologies when they could choose them all, working under one system with only one database, to provide a holistic security and safety solution?

After all, users seek to deploy the best of the best and have heard about the benefits of emergency lockdown, Wi-Fi, network on a card, mesh networks and all the other new technologies being discussed in the media and at tradeshows.

Users have said they want their electronic locks to integrate seamlessly with their existing software. In addition, they want lock hardware to be as easy to upgrade as its software. The lock itself would provide a migration path to future technology needs, not only protecting the facility but also protecting its investment.

Users could upgrade their locks without ever taking them off the door, saving installation costs. Let’s look at this issue a little closer.

When Standalone Offline Locks Make Sense
Standalone offline locks are a cost-effective way to upgrade from traditional mechanical locking devices. They provide more convenient security than traditional mechanical locking devices, along with:

Audit trail reports that tell you who went where and when;

The options to update users and access rights at the lock using the keypad, authorized credentials or a handheld programming device;

The ability to program automatic lock and unlock times as well as holiday schedules; and

The ability to add and delete users easily, track usage and manage data without installing a facility-wide network.

This gives users more control, allowing them to manage the system more efficiently than they could with a traditional mechanical system. These computer-managed locks are ideal in situations where users may want the convenience of a networked status signal monitoring.

Computer-managed offline locking systems are cost-effective and easy to install because they do not require routing network cables or power wires when retrofitting an existing facility with electronic access control. These standalone, programmable, batterypowered locks are networked through software to provide audit-trail capability and time-based scheduling for restricting access.

Standalone locks, exit trim and offline hard-wired controllers, which manage strikes and magnets, can be programmed using access control software from a laptop or PDA. A variety of credentials, including PIN, magnetic stripe cards, proximity cards and smart cards, can be used with this type of system.

New users, access points and access privileges can be entered into the system in seconds. Users can upload updates to each device via a handheld programmer or programming credential.

Security professionals can become creative and provide a balanced approach to access control with such standalone locking systems. These systems facilitate simplified, uniform access control administration. Multiple openings on a campus or in a building can be managed with a variety of standalone locking solutions that share common access control software, simplifying management by eliminating redundancies associated with managing multiple systems. These battery-powered, standalone locksets and exit trim provide code-compliant-free egress and are easy to retrofit.

The system operator can easily use the system’s software to control both users and access points based on time of day, day of the week, credential needed and period of time. Reports show audit trails retrieved, access privileges granted and time functions established, categorized by either the user or door.

With a PDA, the administrator can open and plug the interface into the locking system right at the door and upload new access instructions to the lock while downloading audits of who has been through the door and when they went through.

Access rights can even be assigned to users by credential and time function, providing the system operator with flexibility to control the flow of people into, through and out of a facility. Selectable functions include time zones, time activation and expiration, auto-unlock time scheduling, first-person-in and holiday scheduling. A variety of reports are available to help manage a facility more efficiently, including audit trail data, access privileges data, and time function schedules by user or door.

Whatever the credential, administrators can perform various functions, including momentary and maintained access, lockout, one time use, supervised and even linked access, in which a code must be used in tandem with a credential, such as at a bank’s ATM.

Linked access reduces the probability of lost or stolen credentials yielding unauthorized access. These computer-managed locking devices can even manage up to 5,000 users per opening, which is useful for those facilities with high turnover.

They will also provide audits on up to the last 5,000 events that occur at the opening.

When Do You Move to Networked Wireless Locks?
In facilities that need increased monitoring and control, a networked solution is essential. Networking provides the ability to instantly change access rights and schedules on a large number of doors, monitor and control the system in real-time, and manage large user databases from one centralized computer.

What are you looking for? In most cases, you will want:

An open-architecture platform that allows for easy integration into virtually any access control or other software system;

Real-time monitoring capability that can inform you of various conditions, such as a low battery or a door held open;

Real-time audit trails that can tell you who went where and when;

A centralized lockdown feature that allows you to secure your facility instantly; and

Configurable fail safe/fail secure and other capabilities per code.

The business case for deploying wireless systems for networked openings is compelling. Installations demonstrate that a wireless solution can have a substantially lower installed cost than an online, hardwired system because wireless systems use less hardware and install five to 10 times faster. They also make it easy to retrofit electronic access control solutions in facilities and applications that have previously held back due to budget constraints or installation limitations.

In addition to providing access control at a door in the form of a wireless lock, organizations can now take advantage of wireless solutions for elevators, gates, exit devices and electric strikes. Importantly, the wireless system easily integrates into all existing access control systems, and customers can continue to use their existing keys or electronic credentials.

Migrating from Standalone to Wireless
It used to be that one would remove the standalone lock and change it out with a wireless lock, preferably one with the same footprint. This would take about an hour or so per door.

Today, it is much easier with modular locking systems, such as the Schlage AD-Series locks.

With interchangeable network modules, you can go from standalone, offline locking to a networked access control system by installing a 900 MHz communication module and upgrading the firmware. After linking the lock to a panel interface module, you can initiate emergency lock/unlock commands throughout the facility when needed and change access rights from a central location.

Furthermore, you can use wireless on those openings where it has been traditionally too expensive or cumbersome to switch over but still use hardwired networked locks where it is most cost effective, all under one system and one database.

“Usually, with WiFi, access control decisions are downloaded by the host into the lock five to six times per day versus five to six times per hour with 900 MHz solutions, a 10-minute heartbeat,” said Gary Conley, University of Virginia’s facilities and systems engineer in the office of business operations. “Access control decisions may also be managed within the locks -- as is the case with offline locks -- to minimize communication from the lock to the host and conserve batteries. However, such limited connectivity with the host limits the locks’ ability to receive urgent commands from the host.

For instance, even with a 900 MHz platform, a direction to immediately lock down could be ignored for 10- plus minutes.

“With the AD-Series, a new Schlage patent-pending ‘wake up on radio’ feature works in parallel with the 10-minute heartbeat. Without waking up the entire lock, it listens for complementary commands every one to 10 seconds and responds. Thus, ten seconds is the longest it will take to initiate lockdown,” Conley said.

The 900 MHz band also enables longer transmission ranges and simplifies system design. Signals with longer wavelengths travel a greater distance and penetrate through and around typical building construction much better than signals with shorter wavelengths.

Pathway as Long, Short as Required
When planning the move from the mechanical world to electronic, networked or wireless locking systems, remember that the transition does not have to take place overnight and that it does not need to be total.

Adding electronic locking systems to access points as time and budgets allow is a sensible migration plan for any organization, no matter how large or small. A large facility may have dozens of doors with varying levels of security needs. A broom closet may be adequately secured with a simple offline lock, while surveillance or computer rooms may demand high-security locks that are integrated with access control systems.

No two facilities are alike; choosing a scalable solution allows users to accommodate a variety of offline and networked needs within the same system.

The right lock system for a given door may be found anywhere along the electronic migration path.

This article originally appeared in the April 2011 issue of Security Today.

Featured

  • Maximizing Your Security Budget This Year

    The Importance of Proactive Security Measures: 4 Stories of Regret

    We all want to believe that crime won’t happen to us. So, some business owners hope for the best and put proactive security measures on the back burner, because other things like growth, attracting new customers, and meeting deadlines all seem more pressing. Read Now

  • 91 Percent of Security Leaders Believe AI Set to Outpace Security Teams

    Bugcrowd recently released its “Inside the Mind of a CISO” report, which surveyed hundreds of security leaders around the globe to uncover their perception on AI threats, their top priorities and evolving roles, and common myths directed towards the CISO. Among the findings, 1 in 3 respondents (33%) believed that at least half of companies are willing to sacrifice their customers’ long-term privacy or security to save money. Read Now

  • Milestone Announces Merger With Arcules

    Global video technology company Milestone Systems is pleased to announce that effective July 1, 2024, it will merge with the cloud-based video surveillance solutions provider, Arcules. Read Now

  • Organizations Struggle with Outdated Security Approaches, While Online Threats Increase

    Cloudflare Inc, recently published its State of Application Security 2024 Report. Findings from this year's report reveal that security teams are struggling to keep pace with the risks posed by organizations’ dependency on modern applications—the technology that underpins all of today’s most used sites. The report underscores that the volume of threats stemming from issues in the software supply chain, increasing number of distributed denial of service (DDoS) attacks and malicious bots, often exceed the resources of dedicated application security teams. Read Now

Featured Cybersecurity

Webinars

New Products

  • Camden CV-7600 High Security Card Readers

    Camden CV-7600 High Security Card Readers

    Camden Door Controls has relaunched its CV-7600 card readers in response to growing market demand for a more secure alternative to standard proximity credentials that can be easily cloned. CV-7600 readers support MIFARE DESFire EV1 & EV2 encryption technology credentials, making them virtually clone-proof and highly secure. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • FEP GameChanger

    FEP GameChanger

    Paige Datacom Solutions Introduces Important and Innovative Cabling Products GameChanger Cable, a proven and patented solution that significantly exceeds the reach of traditional category cable will now have a FEP/FEP construction. 3