IP’s access control capture

November 2016 Access Control & Identity Management, Integrated Solutions, IT infrastructure

Unlike the surveillance market, the access control sector of the security industry is not known for constant innovation – not that it has been resting on its laurels. Perhaps this is because the concept of controlling access to a building or campus has always been a fairly standard process. Over the past couple of years, however, the industry has followed the surveillance market in making the move to IP-based access control, but without the fanfare we hear from the CCTV world.

The move to IP could be seen as a natural evolution, or perhaps the requirement to more easily integrate access with other security as well as building management systems. The integration of access control and video surveillance is a popular example of this. With everything running on the same network, management becomes simpler and the skills required for maintenance and repairs are also consolidated. And, of course, the ability to host your access solution in the cloud is also simpler. Of course, this is not completely dependent on simply adopting IP as your base infrastructure, but it helps.

In a ‘pure’ IP access controlled solution, the idea is that more functionality is also to be found in the reader/controller, once again expanding the scope of the access control system beyond simply allowing someone through a door or not. While it is fairly clear today that IP is the future of access control, Hi-Tech Security Solutions asked a number of people active in the industry locally for their take on how the African market is moving (or not) to IP. Are we about to see a mass migration or a more conservative approach?

Consolidation or not

Dan Drayton, Paxton’s country manager for South Africa believes the launch of global companies such as Paxton into the South African market in recent years has helped drive the change to IP, making some of the domestic brands move quickly to bring their own IP solutions to market.

Dan Drayton.
Dan Drayton.

Moreover, he says, “the recent acquisition of Impro shows this is the beginning, not the end, of consolidation in our market as the global players look to acquire new technology or buy market share.”

Brian Wynberger, national technical manager at Reditron, adds, “the move to IP can be attributed to a few reasons: the utilising of existing cabling infrastructure makes sense economically, eases installation and enable easier integration of security systems.”

Brian Wynberger.
Brian Wynberger.

Taking a somewhat more philosophical approach, John Loudon, brand manager for access control and fire at PinnSec, notes that all access control systems (ACS) have always incorporated an element of IP in them, even if it just a basic server/client environment. “Most of the popular ACS in Africa provide IP connectivity between all their components and promote this IP option as the preferred configuration. I do not think any one company dominates the move to IP, but I enjoy the perceived competitiveness IP has brought the ACS industry.”

He is of the opinion that the move to IP is being driven by current entrenched players that can offer the best of both worlds (IP and otherwise). Newcomer solutions seem to offer IP only and the African market may still have some trust issues regarding redundancy when it comes to relying on an exclusively IP solution. “People like and trust what they know and IP networks in Africa contend with a set of issues not commonly experienced in First World environments. I would imagine this could be an issue for newcomers with an IP only system.”

However, he does add that Africa is starting to trust IP reliability, understand the ease of implementation and although IP equipment is slightly more expensive, it is a lot less costly on the labour and implementation side. Loudon does not expect IP to be a big integration driver; however, expecting integration and multi-faceted solutions will eventually dominate the environment because that is what customers demand. “We believe in the very long term a building or security system will be judged on the solution it offers for the price: How much bang for your buck from a single source.”

Benefits of IP

If users are to migrate to IP, they first need to understand the benefits they can obtain and why the move is worth the effort. Too many companies have been taken in by the promises of new technology, only to find they fail to deliver when it counts, or that simplicity or other benefits expected are not realised.

IP technology enables the integration of an existing security system, which might consist of CCTV, access control and intruder alarm into a single user interface platform, says Drayton. “However, the proprietary cabling and protocols for legacy systems makes this almost impossible or at the least hugely complex and expensive. Today, there are many integration options for installers to use. For example, all Paxton integrations are available free of charge, while most of the market still charges, further delaying their adoption.”

Echoing these sentiments, Wynberger says having your security system of CCTV, access control, fire and intruder operating in an integrated solution is undeniably useful, and “this is what IP technology has enabled”. For example, he says Reditron can now supply customers with a fully integrated Avigilon, Paxton, and ViRDI system working as a single seamless solution.

As access control does not consume bandwidth like a CCTV implementation does, it is simpler to implement access control on the same network as the e-mail, Internet and business systems. Loudon says this also means the user’s IT department can take ownership, provide first line support and have total control. “Sometimes the challenge is getting these IT departments to accept responsibility and ownership for yet another business process. In my opinion, it is a major benefit for an installer/integrator to pass the database and networking infrastructure maintenance to the client’s IT department. The installers can then concentrate on what they are good at, installing security solutions.”

An IP installation is much simpler than traditional infrastructure, he explains, as the rules are the same for any IP system. In the past, many access control systems used the RS-485 communication infrastructure and had their own preferred tweaks to the rules of RS-485 to enable optimal communication performance for their specific system. Not only did this hinder the integration process, but also the interoperability of different brands.

Integration delivers value

It is a common refrain that IP allows for systems to be more easily integrated and managed. Drayton explains that each of the disciplines in the security industry has a clear value proposition, be that recording events and the analytic potential of CCTV, prevention of unauthorised access with access control, or multi-layered intrusion detection. “It is undeniably useful for these systems to operate seamlessly in a single user interface where the event in one system triggers an event, an alarm or an action in another.”

This can be achieved at very low cost with a Hikvision or Dahua/Paxton integrated solution for example, or in a much more feature-rich way when you explore the possibilities of integration with a VMS solution from a brand like Avigilon, NUUO or Milestone. As we bring in further functionality, such as T&A (time and attendance), customers can start to build a system that really works for them rather than finding them complex and not fit for purpose.

Wynberger adds that education is critical, but professional security installers and integrators are actually very well educated on IP through widely available training programmes and their desire to add greater value to end customers. Drayton supports this saying Paxton’s nationwide free training is helping installers and integrators to better use IP technology, showing them all they need to know to install, setup and maintain a Net2 system for the benefit of their customers.”

While the idea of integration is the buzz in the market at the moment, IP conformity, like using HTML for a website, has allowed for integration between different disciplines to be easier than ever before, agrees Loudon. He believes a reliable system that combines multiple disciplines (access control, people and time management, CCTV, PA, EVAC, intrusion and basic IO BMS) and that is affordable will eventually dominate the small to medium market sector. In addition, he says, “As legislation starts to dominate and influence even the smaller companies’ way of doing business, a cost-effective solution that satisfies legal requirements on a multi-discipline level will dominate. Some manufacturers are already moving in this direction.”

Digital convergence?

As access moves to IP, the potential for further value add is there in integrating all physical access functions with logical access. With one’s credentials stored in an enterprise directory, for example, logical and physical access can be controlled from a central point.

Loudon says one would expect these traditionally independent access functions to be merged, but this is generally not the case. There have been converged physical/logical solutions on the market for some time, but the uptake has not been dramatic.

“I only know of one site in South Africa that will not allow you to log into your computer unless you have first clocked on at the reception T&A clocking point,” Loudon says. “However, most of the time this is an impractical function as many of us like to work from home occasionally. With respect to time management, there are several sites where the payroll influences the time and attendance, which in turn influences the access control system. Therefore, for example, when you put in leave on the self-help payroll system, you will automatically be denied access onto site by the ACS. Should you be black-listed on the payroll, you will be arrested when trying to gain access on-site. Maybe the South African universities should adopt this functionality.”

Yet, while integrating access silos may seem like a good idea, using IP as your basic infrastructure also raises the question of cyber attacks, or hacking.

“We have to accept that having an inter-connected system with common protocols on a single network does expose our security system to the potential for cyber attack,” says Wynberger. “However, manufacturers all have their own encryptions for managing their hardware and software so that customers can feel secure.”

Drayton adds that one cannot rule out the possibility of being attacked, but the greater threat to a building’s integrity is the quality of the system used. “Many buildings still utilise low-cost solutions, where the door control hardware is housed in the reader, which can make the system vulnerable to a security breach. We would always advocate a client to install a system built on a door control backbone, with readers attached to provide the highest quality solution.”

Loudon agrees, “Like all IP-based systems, your IP access control system is equally likely to be corrupted by cyber issues as your VoIP (voice over IP) or any other IP system. The important thing is the way these IP systems are managed.”

When considering the move to IP-based access control, there are many benefits to offer users. The conservative nature of the physical access control industry, however, will see the uptake of IP remaining steady, but slow. There will be continual growth of the number of IP systems installed over the next few years, partially because of the integration benefits IP delivers. The benefit of IP is that customers are not forced to go with major upgrades and can migrate when necessary and convenient, mixing and matching as they go and creating hybrid solutions. It is these hybrid solutions we will see dominating the market in future.

The key to moving to IP-based access control is control: your management of the system and its integrations will determine the success of the project in the long term. And, of course, refraining from opting for the cheapest product on the market that is offered with a full basket of promises but only delivers problems.

For more information:

Paxton: www.paxtonaccess.co.za

PinnSec: www.pinnsec.co.za

Reditron: www.reditron.co.za


Credit(s)






Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

A customised solution for backup power
August 2019, Specialised Battery Systems , News, Integrated Solutions
Specialised Battery Systems designed and implemented a bespoke solution for Stallion Security Electronics to deploy at almost any site.

Read more...
HID addresses identification challenges at ID4Africa
August 2019 , News, Access Control & Identity Management, Government and Parastatal (Industry)
Being able to verify people’s identities is critical for a nation’s growth and prosperity and yet HID says nearly half of all African citizens can’t prove who they are to vote, travel freely and receive government benefits and services.

Read more...
Came acquires Turkish company Özak
August 2019, CAME BPT South Africa , News, Access Control & Identity Management
Came broadens its market horizons and signals growth and consolidation in the Middle East.

Read more...
Double dose of storage security
August 2019 , Products, IT infrastructure
The integration of InfiniBox and SafeNet KeySecure platforms brings data-at-rest encryption together with centralised logging, auditing capability.

Read more...
Augmented security with drones
August 2019, Drone Guards , Editor's Choice, Integrated Solutions
Drone Guards is moving into an untapped market of using drones to secure residential estates and other high-value assets such as mines, farms and commercial properties.

Read more...
10 things to consider when shopping for a VMS
August 2019, Genetec , CCTV, Surveillance & Remote Monitoring, Integrated Solutions
Today’s video management systems (VMS) provide a wide range of tools and capabilities that help make security personnel more efficient by allowing them to focus on what really matters.

Read more...
How far are we really at with artificial intelligence?
August 2019, Axis Communications SA , Editor's Choice, CCTV, Surveillance & Remote Monitoring, IT infrastructure, Residential Estate (Industry)
Justin Ludik unpacks exactly how far AI has come and what it potentially can do for society and more importantly, surveillance.

Read more...
The benefits of electronic visitor management
August 2019, Powell Tronics , Access Control & Identity Management, Residential Estate (Industry)
Access control is a critical aspect of estate security as it represents the controls put in place to restrict entry (and possibly exit) along the outer boundary of the location.

Read more...
Addressing risks by means of access control layout and design
August 2019 , Access Control & Identity Management, Security Services & Risk Management
In order to develop a suitable, practical and appropriate security system for any organisation, it is essential to first develop a master security and life safety plan strategy.

Read more...
Secure hands-free access
August 2019, Suprema , Access Control & Identity Management, Residential Estate (Industry)
Suprema’s facial biometric terminals bring no-touch access into secure residential estates, high-rise apartments and luxury homes providing fast, easy and intuitive user authentication with the added benefit of hygiene.

Read more...