Video entry systems basics

SMART Access & Identity 2025 Access Control & Identity Management

Video entry systems control communication between visitors at a building’s entrance and the people inside. They are most commonly found in private homes or apartment blocks. In recent years, many businesses have adopted video entry systems to welcome visitors to their premises.

The most obvious benefit of video entry systems is the ability to see and speak to a visitor before granting them access. In some places, the entrance of a building is a long way from its perimeter access point. For example:

• An apartment block, where the people in the flats on the top floor cannot see who is at the main entrance on the ground floor.

• A single-family home with a long driveway, where the residents cannot see visitors when they arrive.

• An office building with a perimeter fence and locked pedestrian gate next to automated carpark gates.

With video entry systems, the people inside the premises can see who the visitor is and speak directly to them before granting them access. For residential and commercial buildings alike, this offers greater peace of mind for those inside. Nobody unauthorised can gain access unless someone on the inside manually grants them entry.

What do you need for a video entry system?

The two key components of a video entry system are:

• An external door station.

• An internal monitor.

The door station is located outside the secure door or gate. This would be on the outside of the building’s main entrance door for an apartment block. For a pedestrian gate at the end of a driveway, it would be on the public street side of that gate. The door station consists of a camera, microphone, and one or more call buttons. For a single residence or business, only one call button may be required. There may be one call button per internal unit for apartment blocks or other premises with multiple tenants.

Internal monitors are installed inside the secure side of the door or gate. In an apartment block, one internal monitor would be inside each apartment. A single-family home might have one monitor by the front door and others in different rooms. If all were networked together, all the monitors would receive calls from the door station simultaneously. That way, residents do not need to run across the house to answer the monitor at the front door as quickly as possible.

How do video entry systems work?

When visitors approach the secure door or gate, they press a call button on the external door station. If there are multiple call buttons, they should be labelled to indicate which unit on the inside each is connected to.

When the call button is pressed, it sends a signal, usually via one of three ways, depending on the technical configuration of the system: IP, hard-wired, or GSM.

IP video entry systems

IP stands for Internet Protocol. These systems use an ethernet cable to facilitate communication between the door station and the internal monitor. IP systems are often preferred in larger buildings because they can be added to existing building networks, making them more reliable. They also do not require as much invasive wiring as hard-wired systems.

Hard-wired video entry systems

Hard-wired systems transfer information from the door station to the monitor (and vice versa) over physical wires connecting the two components. They operate on their own network. A hard-wired system can be a great solution in smaller buildings or new-build projects. However, in some cases, another method might be more effective. For example, for a single home with a long driveway, a very long cable would have to be run from the external door station to the internal monitor, which might be inconvenient.

GSM video entry systems

GSM stands for Global System for Mobile Communications. You know this technology already – it is what is behind mobile data on smartphones. It is where the ‘G’ in 3G, 4G, and 5G comes from. In these systems, the signal is sent via a SIM card in the door station to the monitor inside (or to a resident’s mobile phone), where they can pick up the call.

Controlling access with a video entry system

When a call comes to the monitor (or a connected mobile phone) from the door station, the people inside can decide whether to grant access. If access is denied, nothing happens, and the secured door or gate remains electronically locked. If access is granted, a signal is sent from the monitor (or phone) to trigger a relay to release the electronic lock.

2EASY video entry

2EASY is a door entry solution from CDVI that is quick and simple to install and offers users audio and video communication for an affordable price. With both a wired and an IP version available, 2EASY is flexible and adaptable to various projects. Additionally, the free smartphone app allows users to see and speak to visitors and control the door lock remotely (with a Wi-Fi-enabled monitor).

For private residences, 2EASY offers a simple and reliable home security system. Residents can have confidence in always knowing who is at the door or gate and only allowing access to authorised people. For university accommodation and apartment blocks, 2EASY is a simple and innovative way to control entry to flats. Students or residents can come and go as they please and feel safe in the dependable security of their building.

For commercial premises, 2EASY is a sleek solution for managing entry for visitors and employees. Businesses can get the best of both worlds by making visitors feel welcome as soon as they arrive while strictly ensuring that only authorised individuals can enter.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.