Increase Security Not Complexity

Increase Security Not Complexity

Why many systems that integrate access control and video management do more harm than good

As any security officer will tell you, there’s a compelling reason for integrating access control with a video management system (VMS). Key cards and PINs are just the first line of defense against unauthorized access. Cameras trained on entry points provide visual verification, a second level of authentication, to confirm the identity of the person crossing the threshold.

The problems arise in the execution. Two separate displays arranged side-byside— one for access control and the other for the VMS—force the operator to divide his attention, leaving him struggling to synthesize data from two sources into a cohesive understanding of the event. The other problem arises when an access control display becomes too complex to manage when it pulls in a stream of video from the VMS associated with a door. Neither option is ideal because each requires the operator to sift through mountains of extraneous data, extract the information essential to a particular entry point and formulate an appropriate response—all in a matter of seconds. Over time, even great multitaskers find this mission completely overwhelming.

An important principle to keep in mind is the perception tunnel people experience under stress. Complex or nonessential product features that look appealing in the manufacturer’s demonstration become inaccessible and dangerously distracting under the stress of seeing someone on the “most wanted” list appear at your door. This is why law enforcement duty weapons have been stripped of useful addons like manual safeties and magazine lockouts. Even well-trained officers can be derailed by these features during the extreme stress of a shootout.

Where Typical Access Control-VMS Solutions Fall Short

Most combination systems in use deploy a single camera at the access point that is typically zoomed in on individual faces. The standard of keeping this tight viewpoint overlooks the possibility that there could be other individuals—possibly armed and dangerous—out of camera range ready to rush through the door once the first individual gets it open. To maintain adequate security, most facilities need multiple cameras.

A second shortcoming is found in the user interface. Most access control systems are quite complex, displaying a quantity of information that far exceeds what the security operator needs to know about a door event. Adding cameras to that environment makes the situation even worse because it adds a lengthy learning curve for operators, who may never fully master the system’s intricacies.

A third shortcoming is the inability to review video easily. Most combined systems present the operator with live video streaming. But if operators want to go back to look at recent history—perhaps something seemed just a little off about the event and they want to take a second look—it quickly becomes problematic. The interface simply isn’t designed to support that option.

Finding a Middle Ground

The key is to provide an uncomplicated integrated solution that boils down the security guard’s experience to just the essential elements: who’s coming through that particular door and what he should and can do about it. All the bells and whistles that supervisors or upper management might need—such as creating new key cards or a PIN, running statistical analysis or, in the case of a VMS, sophisticated analytics—should be stripped away to provide the frontline user with a simpler, more easily actionable version of the combined systems. A truly uncomplicated interface cannot be created by patching video images into the access control system or dragging some access control facilities into the VMS. Either would create a complexity that would be difficult, if not impossible, to master.

What’s necessary is a “middleware” program that can integrate the essence of access control and the essence of video management into a single, unified, easily understood screen.

The ideal system would allow the security guard to control door access and opening and locking mechanisms at will, as well as to see a list of the cameras associated with each entry point he’s monitoring. From the display, the guard would be able to call up any and all camera views—including current or recent history— as well as manipulate any pan/tilt/zoom features the cameras may possess. And most importantly, the interface would be so simple that the program would take 10 minutes or less.

As with today’s hybrid cars, such a program requires a great deal of complexity under the hood to make the operation appear so simple. If you had to stop to think about the conversion between gas and electricity every time you touched the accelerator, you’d be too distracted to drive the car. Mastering the art of simplicity is what’s going to make adoption of access control- VMS solutions really take off.

Nothing More, Nothing Less

A well-integrated access control-VMS solution aims to avoid presenting more information than necessary—thus averting decision paralysis—or presenting less information than necessary—which could lead responders off in the wrong direction because pertinent event data is missing. Marrying the essence of both systems while minimizing complexity for operators can raise security to a new level without taxing the human resources deployed as your frontline defense.

This article originally appeared in the November 2011 issue of Security Today.

Featured

  • The Next Generation

    Video security technology has reached an inflection point. With advancements in cloud infrastructure and internet bandwidth, hybrid cloud solutions can now deliver new capabilities and business opportunities for security professionals and their customers. Read Now

  • Help Your Customer Protect Themselves

    In the world of IT, insider threats are on a steep upward trajectory. The cost of these threats - including negligent and malicious employees that may steal authorized users’ credentials, rose from $8.3 million in 2018 to $16.2 million in 2023. Insider threats towards physical infrastructures often bleed into the realm of cybersecurity; for instance, consider an unauthorized user breaching a physical data center and plugging in a laptop to download and steal sensitive digital information. Read Now

  • Enhanced Situation Awareness

    Did someone break into the building? Maybe it is just an employee pulling an all-nighter. Or is it an actual perpetrator? Audio analytics, available in many AI-enabled cameras, can add context to what operators see on the screen, helping them validate assumptions. If a glass-break detection alert is received moments before seeing a person on camera, the added situational awareness makes the event more actionable. Read Now

  • Transformative Advances

    Over the past decade, machine learning has enabled transformative advances in physical security technology. We have seen some amazing progress in using machine learning algorithms to train computers to assess and improve computational processes. Although such tools are helpful for security and operations, machines are still far from being capable of thinking or acting like humans. They do, however, offer unique opportunities for teams to enhance security and productivity. Read Now

Featured Cybersecurity

New Products

  • ResponderLink

    ResponderLink

    Shooter Detection Systems (SDS), an Alarm.com company and a global leader in gunshot detection solutions, has introduced ResponderLink, a groundbreaking new 911 notification service for gunshot events. ResponderLink completes the circle from detection to 911 notification to first responder awareness, giving law enforcement enhanced situational intelligence they urgently need to save lives. Integrating SDS’s proven gunshot detection system with Noonlight’s SendPolice platform, ResponderLink is the first solution to automatically deliver real-time gunshot detection data to 911 call centers and first responders. When shots are detected, the 911 dispatching center, also known as the Public Safety Answering Point or PSAP, is contacted based on the gunfire location, enabling faster initiation of life-saving emergency protocols. 3

  • Camden CM-221 Series Switches

    Camden CM-221 Series Switches

    Camden Door Controls is pleased to announce that, in response to soaring customer demand, it has expanded its range of ValueWave™ no-touch switches to include a narrow (slimline) version with manual override. This override button is designed to provide additional assurance that the request to exit switch will open a door, even if the no-touch sensor fails to operate. This new slimline switch also features a heavy gauge stainless steel faceplate, a red/green illuminated light ring, and is IP65 rated, making it ideal for indoor or outdoor use as part of an automatic door or access control system. ValueWave™ no-touch switches are designed for easy installation and trouble-free service in high traffic applications. In addition to this narrow version, the CM-221 & CM-222 Series switches are available in a range of other models with single and double gang heavy-gauge stainless steel faceplates and include illuminated light rings. 3

  • EasyGate SPT and SPD

    EasyGate SPT SPD

    Security solutions do not have to be ordinary, let alone unattractive. Having renewed their best-selling speed gates, Cominfo has once again demonstrated their Art of Security philosophy in practice — and confirmed their position as an industry-leading manufacturers of premium speed gates and turnstiles. 3