The Right Fit

The Right Fit

Choosing the appropriate access control solution for a retro

Over the past decade, there has been a considerable need for added security in schools, hospitals and commercial buildings. This heightened demand for security has led to the continued growth and advancement of progressive access control systems. Due to these advancements, there is now more opportunity to retrofit existing buildings with up-to-date, advanced access control solutions. Choosing the appropriate access control solution in any building situation, especially when discussing a retrofit, can be a complex task. In addition to addressing factors such as cost, time and functionality requirements, limitations inherent to a building’s design can make upgrading or installing a brand-new access control system in older buildings particularly challenging.

With so many options on the market it is important for distributors, maintenance managers and facility managers to understand the building’s characteristics and needs. What are the traffic patterns in and out of the building and specific areas? What are the desired goals for the system? What are the budget constraints to create a solution that will suit the facility’s needs? What kind of level of security is required?

Identifying and understanding the answers to these questions will help someone make an educated, strategic decision on what kind of access control solution works best for them. By avoiding a ‘one-sizefits- all’ approach to access control, decision-makers can avoid unnecessary time and costs.

Standalone System

Standalone systems, where certain access points are equipped with card readers but are not connected to a larger network, can provide a cost-effective access control solution. These offline solutions are especially applicable in retrofit applications where there is not enough room to install panels or monitoring equipment or in situations where it would be impossible to wire the entire building. The electronic locks also add a level of security that mechanical locks cannot provide.

There are certain situations where a building manager may need to keep a certain person out. If the access point was controlled by a mechanical lock, and that individual had a key, the locks would need to be promptly changed. However, with a standalone system, the electronic lock can be quickly programmed to not recognize that individual’s card or keypad code. In addition, system administrators can download audit trails to view when certain users opened specific doors. This allows operators to monitor the activity to building entrances. Standalone readers, while fitting for facilities that contain only a few doors that need access control, are not practical in large buildings that contain numerous security points.

Standalone systems require an administrator to walk to each reader to retrieve the information and make changes to the access rights. This is not only time consuming, but it also means that standalone readers cannot be monitored in real time. The inability for real-time monitoring can be especially problematic in schools and other facilities where an immediate lockdown capability may be needed.

Networked Solutions

Implementing a networked, or online solution eliminates the need for administrators to walk to each lock to update the system or download the audit trail. Wired solutions have been around for more than 30 years. During that time, development of wireless technology has improved to the point where wireless systems can be as effective as wired systems can but at a fraction of the cost. Both hardwired and wireless solutions allow system administrators to download audit trails and program locks over the internet, cutting time down significantly. Both solutions can provide real-time monitoring and management, and have more efficient lockdown capabilities.

Wired solutions are more practical for new buildings as they require extensive wiring. When retrofitting a building, using wired access control can be very costly and labor intensive. In order to extend wiring to the lock, the door must be drilled with a raceway. This process is tedious, requires special skills and leaves little room for error. Special electronic hinges with thru-wires are needed to run the wire from the frame to the door and ultimately, to the lock. Another factor to take into consideration for a retrofit is the productivity of those already occupying the building. The excessive noise and dust that are by-products of modifying doors can be very disruptive in environments where people are working.

To prevent the additional cost, time and construction of having to run wire through older buildings, facility managers and other decision-makers should consider a wireless access control solution. Not only is installation significantly faster, the costs with implementing a wireless solution is far less than those associated with traditional wired solutions. This is due to the complexity of the installation, hardware and ongoing licensing. There are, however, other factors to consider when deciding on a wireless system.

One aspect that is important to consider is the type of wireless connection the device uses—Wi-Fi or a wireless mesh network. When implementing a Wi-Fi system, multiple antennas will typically be needed to support the size of the building and solution, adding to the installation costs. Wi-Fi, while extremely common, is generally less secure than using a wireless mesh network such as Zigbee. Zigbee 802.15.4 was developed for devices with long battery life in wireless applications. This technology is more secure than Wi-Fi networks, allows for fast system reconfigurations and is less expensive.

Another element to consider when comparing wireless solutions is how often the system updates. In most cases, systems will only force updates once or twice a day. This can be less than ideal for several reasons. A system might not have the appropriate access rights for hours after the administrator updates the system on the computer, leaving the building open to unintended security risks. The more advanced wireless solutions on the market are designed force an update every ten minutes. This newer technology creates a much more secure environment.

Advanced Network Solutions

Some platforms available provide much needed flexibility by allowing smart credentials to be data transmitters between access points. These data-on-card systems can both read and write update information at the lock/reader of both offline devices and head-end systems and relay it back to the server. This known as a virtual network. This two-way communication between the card and door allows the smart credentials to act as carriers and enables the readers of each door to be updated with crucial information. Implementing this type of “virtual” network eliminates the need for having a wired or wireless lock at every opening one wishes to secure. This greatly reduces the costs of the access control system. The characteristics of how a virtual network works with advanced smart card technology both saves time and money, and tightens security by providing actionable data in a more efficient way.

Retrofitting a virtual network into a building is a relatively inexpensive initiative. In fact, implementing a virtual network access control system can ultimately cost two to three times less than a standard wireless system. It is important for decision-makers to contact experts in the industry to understand what solution or combination of solutions is best for their situation.

There are many factors to consider when deciding to retrofit a building with an updated access control solution. It is crucial to understand the needs of the facility, as well as the pros and cons of each type of solution. A well-designed and executed access control system can help reduce maintenance and operational costs, while still providing the highest level of security the administrator desires. There may be specific situations where it makes sense to install a combination of wireless and virtual networks to best serve the security needs of a building. Applying new technologies gives distributors, installers and end users a unique chance to help facilities build a customized access control system that fits all of their specific needs.

This article originally appeared in the February 2018 issue of Security Today.

Featured

  • Evolving Cybersecurity Strategies: Uniting Human Risk Management and Security Awareness Training

    Organizations are increasingly turning their attention to human-focused security approaches, as two out of three (68%) cybersecurity incidents involve people. Threat actors are shifting from targeting networks and systems to hacking humans via social engineering methods, living off human errors as their most prevalent attack vector. Whether manipulated or not, human cyber behavior is leveraged to gain backdoor access into systems. This mainly results from a lack of employee training and awareness about evolving attack techniques employed by malign actors. Read Now

  • Report: 1 in 3 Easily Exploitable Vulnerabilities Found on Cloud Assets

    CyCognito recently released new research highlighting critical security vulnerabilities across cloud-hosted assets, revealing that one in three easily exploitable vulnerabilities or misconfigurations are found on cloud assets. As organizations increasingly shift to multi-cloud strategies, the findings underscore significant security gaps that could provide attackers with potential footholds into networks. Read Now

  • Built for Today, Ready for Tomorrow

    Selecting the right VMS is critical for any organization that depends on video surveillance to ensure safety, security and operational efficiency. While many organizations focus on immediate needs such as budget and deployment size, let us review some of the long-term considerations that can significantly impact a VMS's utility and flexibility. Read Now

  • Paving the Way to Smart Buildings

    In today's rapidly evolving security landscape, the convergence of on-prem, edge and cloud technologies are critical. The physical security landscape is undergoing a profound transformation, driven by the rapid digitalization of buildings and the evolving needs of modern organizations. As the buildings sector pivots towards smart, AI and data-driven operations, the integration of both edge and cloud technology has become crucial. Read Now

  • The Cybersecurity Time Bomb

    If you work in physical security, you have probably seen it: a camera, access control system, or intrusion detection device installed years ago, humming along without a single update. It is a common scenario that security professionals have come to accept as "normal." But here is the reality: this mindset is actively putting organizations at risk. Read Now

New Products

  • Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

    Connect ONE®

    Connect ONE’s powerful cloud-hosted management platform provides the means to tailor lockdowns and emergency mass notifications throughout a facility – while simultaneously alerting occupants to hazards or next steps, like evacuation.

  • Automatic Systems V07

    Automatic Systems V07

    Automatic Systems, an industry-leading manufacturer of pedestrian and vehicle secure entrance control access systems, is pleased to announce the release of its groundbreaking V07 software. The V07 software update is designed specifically to address cybersecurity concerns and will ensure the integrity and confidentiality of Automatic Systems applications. With the new V07 software, updates will be delivered by means of an encrypted file.

  • AC Nio

    AC Nio

    Aiphone, a leading international manufacturer of intercom, access control, and emergency communication products, has introduced the AC Nio, its access control management software, an important addition to its new line of access control solutions.