Video entry systems basics

SMART Access & Identity 2025 Access Control & Identity Management

Video entry systems control communication between visitors at a building’s entrance and the people inside. They are most commonly found in private homes or apartment blocks. In recent years, many businesses have adopted video entry systems to welcome visitors to their premises.

The most obvious benefit of video entry systems is the ability to see and speak to a visitor before granting them access. In some places, the entrance of a building is a long way from its perimeter access point. For example:

• An apartment block, where the people in the flats on the top floor cannot see who is at the main entrance on the ground floor.

• A single-family home with a long driveway, where the residents cannot see visitors when they arrive.

• An office building with a perimeter fence and locked pedestrian gate next to automated carpark gates.

With video entry systems, the people inside the premises can see who the visitor is and speak directly to them before granting them access. For residential and commercial buildings alike, this offers greater peace of mind for those inside. Nobody unauthorised can gain access unless someone on the inside manually grants them entry.

What do you need for a video entry system?

The two key components of a video entry system are:

• An external door station.

• An internal monitor.

The door station is located outside the secure door or gate. This would be on the outside of the building’s main entrance door for an apartment block. For a pedestrian gate at the end of a driveway, it would be on the public street side of that gate. The door station consists of a camera, microphone, and one or more call buttons. For a single residence or business, only one call button may be required. There may be one call button per internal unit for apartment blocks or other premises with multiple tenants.

Internal monitors are installed inside the secure side of the door or gate. In an apartment block, one internal monitor would be inside each apartment. A single-family home might have one monitor by the front door and others in different rooms. If all were networked together, all the monitors would receive calls from the door station simultaneously. That way, residents do not need to run across the house to answer the monitor at the front door as quickly as possible.

How do video entry systems work?

When visitors approach the secure door or gate, they press a call button on the external door station. If there are multiple call buttons, they should be labelled to indicate which unit on the inside each is connected to.

When the call button is pressed, it sends a signal, usually via one of three ways, depending on the technical configuration of the system: IP, hard-wired, or GSM.

IP video entry systems

IP stands for Internet Protocol. These systems use an ethernet cable to facilitate communication between the door station and the internal monitor. IP systems are often preferred in larger buildings because they can be added to existing building networks, making them more reliable. They also do not require as much invasive wiring as hard-wired systems.

Hard-wired video entry systems

Hard-wired systems transfer information from the door station to the monitor (and vice versa) over physical wires connecting the two components. They operate on their own network. A hard-wired system can be a great solution in smaller buildings or new-build projects. However, in some cases, another method might be more effective. For example, for a single home with a long driveway, a very long cable would have to be run from the external door station to the internal monitor, which might be inconvenient.

GSM video entry systems

GSM stands for Global System for Mobile Communications. You know this technology already – it is what is behind mobile data on smartphones. It is where the ‘G’ in 3G, 4G, and 5G comes from. In these systems, the signal is sent via a SIM card in the door station to the monitor inside (or to a resident’s mobile phone), where they can pick up the call.

Controlling access with a video entry system

When a call comes to the monitor (or a connected mobile phone) from the door station, the people inside can decide whether to grant access. If access is denied, nothing happens, and the secured door or gate remains electronically locked. If access is granted, a signal is sent from the monitor (or phone) to trigger a relay to release the electronic lock.

2EASY video entry

2EASY is a door entry solution from CDVI that is quick and simple to install and offers users audio and video communication for an affordable price. With both a wired and an IP version available, 2EASY is flexible and adaptable to various projects. Additionally, the free smartphone app allows users to see and speak to visitors and control the door lock remotely (with a Wi-Fi-enabled monitor).

For private residences, 2EASY offers a simple and reliable home security system. Residents can have confidence in always knowing who is at the door or gate and only allowing access to authorised people. For university accommodation and apartment blocks, 2EASY is a simple and innovative way to control entry to flats. Students or residents can come and go as they please and feel safe in the dependable security of their building.

For commercial premises, 2EASY is a sleek solution for managing entry for visitors and employees. Businesses can get the best of both worlds by making visitors feel welcome as soon as they arrive while strictly ensuring that only authorised individuals can enter.


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Banking’s AI reckoning
Commercial (Industry) Surveillance Access Control & Identity Management Fire & Safety Perimeter Security, Alarms & Intruder Detection Information Security Asset Management News & Events Integrated Solutions Infrastructure Security Services & Risk Management Education (Industry) Entertainment and Hospitality (Industry) Financial (Industry) Healthcare (Industry) Industrial (Industry) Mining (Industry) Residential Estate (Industry) Retail (Industry) Transport (Industry) Conferences & Events Products & Solutions Associations Videos Training & Education Smart Home Automation Agriculture (Industry) Logistics (Industry) AI & Data Analytics Facilities & Building Management IoT & Automation Power Management
From agentic commerce disputes to quantum-powered risk modelling, SAS experts offer a ‘banker’s dozen,’ 13 industry-defining predictions that will separate institutions that master intelligent banking from those still struggling with the basics.

Read more...
Identity-led security in banking
Secutel Technologies Access Control & Identity Management Products & Solutions
Traditional keys, cards, and siloed systems are no longer sufficient in a world where security, compliance, and operational efficiency must work together seamlessly. In 2026, the focus is firmly on smart access.

Read more...
2026 Industry Trends Report calls out security’s next opportunity
Integrated Solutions Access Control & Identity Management Perimeter Security, Alarms & Intruder Detection
Gallagher Security has released its 2026 Security Industry Trends Report, drawing on insights from end users, channel partners, consultants, and technology stakeholders; highlighting a growing opportunity for security to play a more strategic, value-driven role across organisations worldwide.

Read more...
Smarter access, stronger defence
Secutel Technologies Security Services & Risk Management Access Control & Identity Management Retail (Industry)
The holiday season brings excitement, increased foot traffic and, unfortunately, a spike in criminal activity targeting retail environments. Taking a proactive approach to security is essential in ensuring staff and assets remain safe.

Read more...
Who are you?
Access Control & Identity Management Information Security
Who are you? This question may seem strange, but it can only be answered accurately by implementing an Identity and Access Management (IAM) system, a crucial component of any company’s security strategy.

Read more...
Who has access to your face?
Access Control & Identity Management AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts.

Read more...
Is your entrance security secure?
SMART Security Solutions Centurion Systems Technews Publishing News & Events Access Control & Identity Management Smart Home Automation
While Centurion Systems may be known as a leader in gate and door motors in 72 countries, the company has developed more than hardware and now offers an automation ecosystem for access control security.

Read more...
Continuum launches centralised access and identity management
Editor's Choice Access Control & Identity Management Integrated Solutions Facilities & Building Management
Continuum Identity is a newly launched company in the identity management and access control sector, targeting the complexity of managing various Access and Identity Management (AIM) systems.

Read more...
Who has access to your face?
Access Control & Identity Management Residential Estate (Industry) AI & Data Analytics
While you may be adjusting your privacy settings on social media or thinking twice about who is recording you at public events, the reality is that your facial features may be used in other contexts,

Read more...
Advanced time & attendance solutions
Technews Publishing Access Control & Identity Management Products & Solutions
From biometric devices to a powerful mobile app, you will see how businesses of all sizes save time, cut costs, and improve productivity with BioSyn.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.