Five reasons for IT to get ­physical with access control

Access & Identity Management Handbook 2015 Access Control & Identity Management, Cyber Security

Network security and building security are equally important. If either system is compromised, the organisation is immediately at risk. But while many network security systems are now built to support IT best practices and standards, such as, virtualisation, physical access control systems (PACS) have traditionally been designed without IT professionals in mind.

Not only are these legacy systems more difficult for IT departments to deploy, support and maintain, they are also more cumbersome for physical security and facility operations colleagues to manage on a day-to-day basis, often requiring expensive, standalone Windows servers, individually licensed software and proprietary door hardware, while only being accessible from a few, isolated office computers.

Fortunately, these limitations are finally changing, as a new breed of affordable, web-based physical access control systems provide several key advantages over traditional PACS. While there are many factors to consider, five of the most important attributes of an IT- and user-friendly physical access control system include platform reliability, system security, mobile access, ease of use and non-proprietary door hardware.

This guide has been written to help IT professionals evaluate the effectiveness of their existing building security system and work with their physical security counterparts to find a physical access control system that meets their organisation’s overall security, IT and budgetary needs.

1. Reliability

Making sure a door opens or closes in real-time when it is supposed to might seem a little obvious, but taking the time to ensure your physical access control system is trusted and reliable cannot be overlooked. This goes beyond troubleshooting, testing and transitioning your PACS during a trial, pilot or rollover period to the actual design of the software platform and underlying system architecture of the product itself.

Traditional, physical access control systems often require single, standalone Windows servers at each and every facility, increasing maintenance and licensing costs while creating single points of failure. When a server goes down, identities, permissions and policies cannot be updated, with door controllers and card readers granting access to those identities stored locally on-site, until the server can be maintained or repaired.

A next-generation PACS can simplify system redundancy and provide cost-effective auto-failover and hot-standby capabilities, particularly when delivered as an affordable, all-in-one, access control network appliance or solid state, rack-mounted server. Instead of purchasing expensive standalone servers, organisations can deploy two or more network appliances that can synchronise identities, roles and policies across all facilities and door controllers in real-time to reduce costs and increase security.

IT professionals can further reduce costs, enhance scalability and improve reliability by deploying a PACS capable of running in a virtual server environment. When the system runs on a virtual server, set-up can be done in record time, hardware costs are minimised and failover processes become even more painless. A failover VM can be automatically provisioned and initiated while the existing VM deployment is fixed with no hiccup in service.

2. Security

Traditionally, most building security systems have been purpose-built by manufacturers with a background in the physical security industry. While these developers tend to include all of the important features necessary to keep a building manager sleeping soundly through the night, IT professionals may be the ones losing sleep – unless their physical access control system received a thorough code review. Look for platforms that have some kind of assurance that the PACS received an industry-recognised certification to verify their application was hardened against known software vulnerabilities to reduce or eliminate the risk of network attack.

Not only are software vulnerabilities cause for concern, but operating system and server vulnerabilities need to be taken into consideration as well. For example, many legacy physical access control systems are built to run on a standard Windows application or database server, which often requires consistent vulnerability patching and continuous IT resources to ensure the system is not exposed to the latest security threats making their way across the Internet.

Several manufacturers have begun providing Linux-based PACS platforms which significantly reduce system setup, support and maintenance issues, while eliminating patch management and security headaches. A secure, open-source, Linux-based physical access control system may provide the peace of mind you are looking for in a building security system, controlled by users strictly through a web browser, thin-client, instead of a thick-client application.

3. Mobility

The rise of mobile computing cannot be ignored, with mobile devices, such as smartphones or tablets, now connecting to nearly 89 percent of corporate networks, according to Forbes. Given this increasing mobile demand, selecting a web-based, physical access control platform allows users to manage building security from any web browser, from any ­location with Internet access.

Traditional, software-based PACS only runs on specific desktop or laptop computers, forcing IT departments to install and/or upgrade individually-licensed software and servers one-at-a-time. Legacy systems also keep facilities managers and security directors tied to their desks, instead of being able to do their job from any building, at any time, from any location.

Managing facilities requires a lot of in-­person supervision on a day-to-day basis, which is why it is important to look for a physical access control system that works as well on a variety of mobile devices – as well as a variety of PC and Mac web browsers – as it would on a desktop computer down in the basement of the building.

With a web-based access control system, a facilities manager can carry his iPhone, Android smartphone or tablet to an off-site meeting or to the top floor of the building and still be able to respond to alarms, change door schedules or view video surveillance footage. IT professionals, systems integrators and ­security vendors can also log into the system from any web browser to change a system configuration or provide ongoing support.

Additionally, in larger organisations with multiple buildings, office locations or off-site campuses, a thin client system architecture that is delivered via a web browser can significantly reduce costs and increase efficiency when it comes to upgrading, managing and centralising facility access control, when compared to an old, thick-client model that depends on software alone. Without the added software and individual user licence costs, organisations can free up their IT and security budgets to protect additional doors, buildings or facilities.

4. Usability

Ease of use is another important factor to consider when evaluating the effectiveness of a physical access control platform. While IT is comfortable with a wide-range of software, hardware and user interfaces, physical security users may not have as much familiarity with using advanced computers or managing complex operating systems.

A front-desk security guard or back-room facilities manager should easily be able to add, delete or adjust door access schedules and user privileges without feeling intimidated or overwhelmed by the system. Cards, badges and credentials should be easy to update on a regular basis to make sure only the right people have access to the right rooms and resources and that former employees can no longer enter the building. And alarms should be easily accessible and compatible with a variety of video surveillance platforms to provide physical security teams with the information they need to quickly investigate a system alert, security breach or policy violation.

IT professionals, on the other hand, would prefer a system that is built to work the way they work and is designed to integrate with standard IT systems. For example, platforms that support Lightweight Directory Access Protocol (LDAP) are able to bind with an organisation’s existing HR employee database, Active Directory or Identity Access Management (IAM) system, which eliminates the need to maintain two sets of employee and visitor identities and may even allow organisations to assign building access privileges to the users that exist in their network access control system.

Additionally, some physical access control systems are able to easily integrate building security data into a Security Information and Event Management (SIEM) system, so organisations have a unified view of security across the enterprise.

5. Flexibility

Having a physical access control system that can grow and scale with the size of your organisation is critical, whether you need to protect a handful of doors at a single site or hundreds or thousands of doors across multiple buildings and office locations.

With nearly 80% of the cost of a physical access control system attributed to the door hardware – the controllers, switches and card readers that are installed in the walls and ceilings of the building – it is important to choose an access control system that relies on open, non-proprietary door hardware, which provides your organisation with the greatest flexibility.

Many physical access control systems rely on proprietary door controllers and card readers that only work with a single physical access control system, thereby locking organisations into dealing with a single manufacturer, systems integrator and software platform. If you grow unsatisfied with the system, the cost of upgrades, or level of vendor support, the switching costs are prohibitively higher to deploy a new system.

Open architecture systems allow IT and physical security teams to leverage their investment in reusable, non-proprietary door hardware, giving them the ability to more easily and affordably upgrade their access control system by purchasing a new head-end system, without needing to buy and install all new door hardware and controllers. This allows their IT and security budgets to go further, without being forced into using the software platform that is married to the proprietary door hardware. As the organisation expands its footprint or the number of doors increases, IT can simply add more non-proprietary hardware, without worrying about the hardware investment growing outdated.

And because there is still competition for your ongoing access control business, manufacturers and vendors cannot afford to grow complacent.


IT needs an open-architecture system that offers better scalability, the option to install in a virtual environment and improved options for integration with other IT and physical security systems. Not only do these technologies need to be easy to deploy, for example, in a virtual server environment, they also require the system be hardened to cyber attack while remaining completely reliable.

Meanwhile, the facilities team wants a solution that makes their lives easier. They want it to be easy to change, add or delete users from the system, they need it to allow flexibility to grant access exceptions when the situation arises, and they prefer having the ability to control door access privileges with a smartphone or mobile device, wherever they are in the building, without being tied to their desk.

A system that meets everyone’s needs not only improves their workflow, it keeps expenses down, both now and in the future. Organisations that seek out systems that bring together access control with video surveillance, identity management and security information and event management (SIEM) can operate more efficiently and intelligently in all situations.

Perhaps most importantly, though, such a system brings down the barriers that have stalled the convergence of physical and logical access control systems for so long. IT no longer needs to worry about an insecure system that adds more operational overhead. And facilities staff no longer need to spend hours figuring out frustrating and confusing user interfaces. The two parties can finally work together to become more efficient and eliminate security gaps in the process, once an IT- and user-friendly building security system has been acquired.

Real-world convergence

If the door to a server room is propped open, a well-integrated system will trip an alert to physical security stakeholders, who can immediately switch to video feed to monitor what’s going on in real time. The system can automatically suspend network access in nearby rooms until IT and physical security review the SIEM logs to discover what did or didn’t happen, with all activity around the door – including who it was that last swiped in for access – easily accessible.

The right access control platform makes it easier for everyone to do their jobs, and ultimately reduces the risk of a small incident snowballing out of control.

Five reasons for physical security to go mobile

1. No software to install or servers to maintain

2. Control facility access from anywhere

3. Respond to alarms at anytime

4. Stop being tied to your desk

5. Use your existing mobile devices

Five reasons to avoid proprietary door hardware

1. Software and vendor lock-in

2. Complacent manufacturers and vendors

3. Costly support and maintenance plans

4. Prohibitively high switching costs

5. Non-future proof investment

Five reasons for physical security to go virtual

1. Eliminate the cost of stand-alone servers

2. Manage building security in a private cloud

3. Leverage virtual server infrastructure

4. Minimise downtime, maximise reliability

5. Reduce setup and deployment time

Thick vs. thin-client

“With the thick client, you always have to worry about whether an update from Microsoft will break something,” says Steve Travis, IT Support Prof Lead, Georgia Tech Police Department. “You have to worry about security, wondering ‘Do we have to put this computer on a standalone VLAN and just lock it down and basically it will be used only for card access?’ That puts a burden on the department. Whereas if it’s a browser-based system, they could be using the same computer they use for day-to-day emails or whatever they use for work.”

For more information contact Avigilon, +27 (0)72 584 4992,,

Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Turnstar ramps up countermeasures
Turnstar Systems Editor's Choice Access Control & Identity Management News Products
Turnstar has developed and patented an early warning and deterrent system which will alert security, and anyone nearby, of any attempt to place ramps over the raised spikes.

Suprema integrates biometric access control with Genetec
Suprema News CCTV, Surveillance & Remote Monitoring Access Control & Identity Management
Suprema has announced the successful integration of its biometric access control products with Genetec Security Center, a unified security platform that connects security systems, sensors and data in a single intuitive interface.

IDEMIA South Africa achieves level 1 B-BBEE status
IDEMIA News Access Control & Identity Management
As part of the action plan to improve its status to Level 1, IDEMIA now works with over 40 black-owned local suppliers, representing over 30% of IDEMIA’s local suppliers.

Suprema no. 1 in the global biometric market excluding China
Suprema News Access Control & Identity Management
According to the latest report by Omdia, a global market research firm, Suprema ranks first in global market share, excluding China, in the field of biometric readers.

Dahua and Yeastar PBX-intercom integration
Dahua Technology South Africa News Access Control & Identity Management
Dahua Technology and Yeastar announced their new ECO partnership on PBX-intercom integration to provide a comprehensive and unified communication solution for small- and medium-sized enterprises.

Traka launches experience centres
News Access Control & Identity Management
Traka launches inaugural Experience Centres in Australia and South Africa; aims to drive continuous collaboration and innovation.

New platform for keyless access
Access Control & Identity Management
The new ABLOY CUMULUS platform for keyless access combines locking hardware with secure access and management applications in a single ecosystem with a risk-free, integrated cloud service.

Intelligently adapting African cities for a better as well as a safer life
Government and Parastatal (Industry) Cyber Security
Smart buildings and cities therefore require as much a security-centric approach as they do an environmentally sustainable one.

The importance of staying up to date
Access Control & Identity Management Government and Parastatal (Industry)
Africa’s cyber threat landscape is constantly evolving, with government’s facing a range of digital threats from espionage, critical infrastructure sabotage, organised crime and combat innovation.

Dynamic Drop Arm Barrier
Turnstar Systems Access Control & Identity Management
Suited to medium-volume access and medium-level security applications such as office reception areas, health clubs, universities and libraries, the Dynamic Drop Arm Barrier also allows special needs access.