Access module eases admittance

Access & Identity Management Handbook 2017 Access Control & Identity Management, Integrated Solutions

When Turvatiimi moved to new premises at the Flamingo Shopping and Entertainment Center in the suburbs of Helsinki, a new automated access control system was needed.

Turvatiimi have multiple offices at the premises, meaning that a total of 19 doors must have secured access. Employees will move between the offices throughout the day and the company has a high number of visitors daily. A traditional reception or access control system would be impractical to handle this flow of people due to Turvatiimi Oyj’s high security level needs.

All persons entering or leaving have to be identified; visitors have to be handled securely and efficiently, with no tailgaiting of visitors, misused access cards or spoofing of access. These are all inherent risks with traditional access control systems.

Hi-Sec Supply installed 18 cameras (Axis M3007, P8514, M3014, M3005 and P1425-LE) and 19 Axis A1001 Access Control units for controlling the doors. All are controlled by Milestone XProtect Professional video management software (VMS) with full integration to the Axis A1001 door controllers using the Milestone Access Control Module with Axis integration. All employees now have access tokens that can be used at all locations. The system integrates fully with the Responda 113 alarm system, ensuring rapid and informed response if unauthorised access is detected.

The Advantage: the Milestone video-enabled access control system enables Turvatiimi Oyj to keep track of all persons on the premises, while at the same time provide excellent service to visitors. An employee expecting a visitor will get a notification upon the arrival of the visitor, with a picture. This ensures that all persons at the premises are identified. The system will link access to a door with the video from a camera. In this way the identity of a person entering or leaving is ensured. If access tokens are swapped, it can be detected. Tailgating can also be detected through the use of the video verification. Visitors who are temporary staff such as workmen can be identified and tracked if attempting to access the premises during unauthorised hours or to access-restricted areas.

Need for secure but easy access

Turvatiimi realised that a traditional access control system would not be a viable solution for the company because of their need for a high-security solution. Traditional panel-based access control systems require expensive, high-maintenance control panels to convey information and often use proprietary hardware that does not integrate with other systems. It is important to understand that a traditional access control system is only registering events based on the control panel. It might detect that a PIN code is used, but the system is unable to detect if it is an authorised person typing the PIN code. If an incorrect PIN code is disclosed, the security of the system is compromised.

Access control systems using cards or security tokens suffer from the same type of weakness, as cards may be lost, stolen or swapped. Again the system is only able to detect that a certain card has accessed a card reader. If a card or a PIN code has been used to gain unauthorised access, any video security system can only be used to detect unauthorised entry after the fact, unless a manned solution is used.

A video-integrated digital solution based on Ethernet cabling for data and power simplifies installation and offers a higher level of security because the video can link a person to an event, such as a door being accessed. The integration between an access control system and a VMS (Video Management Software) enables a unified operation if the VMS client is used for controlling access, because the visual identification is an added level of security to the access control system.

The extended security and the simplified operation were the main reasons for choosing the integrated Axis/Milestone solution for Turvatiimi. Use of the Milestone Mobile client simplifies operations further and all employees can verify request for access if needed.

The recordings and access control data are kept for two to three weeks in case of the need for investigation of an access event. Furthermore, the use of Milestone XProtect VMS with its open platform technology enables Turvatiimi to add analytics as needed. An example of this could be people counting, giving the exact number of persons at their premises at all times. This is essential information in case of fire or other emergencies.

Initially the system was implemented in Turvatiimi’s headquarters with 50 employees. The rest of the 25 locations are to follow.

Integrated access solutions

The Finnish corporate landscape is currently being shaped by a rising number of small-to-medium-sized enterprises. This has led to increased construction activity in the commercial sector and raised the demand for integrated and efficient security solutions.

The ability to integrate alarms, access control and video security is a key to keep costs down and improve efficiency in alarm handling. If incidents can be documented using integrated access and video security systems, then guarding services can be better informed and thereby more efficient. It could be that a door has been kept open by a contractor or it could be a malfunction of a door-closing mechanism. Video verifies the situation for more appropriate response to alarms.

For more information contact Milestone Systems, +27 (0)82 377 0415, arms@milestonesys.com, www.milestonesys.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The security debt hidden in residential estates
Security Services & Risk Management Integrated Solutions Residential Estate (Industry)
Many residential estates undermine their own security not through a lack of technology, but through hidden weaknesses in gate design, fragmented systems, recurring software dependence, weak operational ownership, and insufficient estate management input.

Read more...
Paxton set to launch game-changing new system
Paxton Access Control & Identity Management News & Events
Access control is evolving fast. Installers and end users are looking for systems that are simple to install, easy to manage remotely, and flexible enough to scale. In response, Paxton is exploring how emerging technologies can reshape access control.

Read more...
SWEAR integrates with Milestone
Milestone Systems Surveillance Products & Solutions
Security footage, legal evidence, and other critical surveillance assets face increasing risks of tampering, raising chain-of-custody questions, jeopardising admissibility, and undermining the timely operational decisions that depend on credible video.

Read more...
Security’s three defining forces for 2026
Milestone Systems AI & Data Analytics Surveillance IoT & Automation
As we move into 2026, several technology trends that were once mostly confined to research labs and conference keynotes are now becoming part of the daily reality of the security industry.

Read more...
Proactive estate security in Cape Town
neaMetrics OneSpace Technologies Technews Publishing SMART Security Solutions Fang Fences & Guards ATG Digital Editor's Choice News & Events Integrated Solutions Infrastructure Residential Estate (Industry)
SMART Security Solutions started the year with our annual SMART Estate Security Conference in Cape Town on 26 February 2026. Held at Anna Beulah Farm, the conference saw a number of delegates enjoying the farm’s excellent cuisine, while listening to outstanding presenters.

Read more...
NEC XON secures mobile provider’s hybrid identities
NEC XON Access Control & Identity Management Information Security Commercial (Industry)
For a leading South African telecommunications operator, identity protection has become a strategic priority as identity-centric attacks proliferate across the industry. The company faced mounting pressure to secure both human and non-human identities across complex hybrid environments.

Read more...
Data privacy best practices for physical security teams
Genetec Surveillance Integrated Solutions IoT & Automation
Physical security systems produce large amounts of information from video footage, access control records, and licence plate data. Recommendations assist organisations in safeguarding sensitive data, while ensuring effective security operations.

Read more...
Gallagher Security strengthens KwaZulu-Natal presence
Gallagher News & Events Integrated Solutions
Gallagher Security has reinforced its commitment to the KwaZulu-Natal region with its Command the Future event. The full-day event welcomed over 100 channel partners, end users, and consultants, marking Gallagher’s third major event in Durban.

Read more...
Cloud security in visitor management and access control
SA Technologies Access Control & Identity Management Infrastructure Residential Estate (Industry) Commercial (Industry)
Cloud has become the default platform for modern security operations, from visitor management portals and remote access control to incident logging, reporting, analytics, and integrations. But “in the cloud” does not mean “someone else is securing it for us”.

Read more...
Surveillance & AI roundtable
DeepAlert Lytehouse Refraime SMART Security Solutions Technews Publishing Editor's Choice Surveillance Integrated Solutions AI & Data Analytics
SMART Security Solutions held an online roundtable with a few surveillance experts to explore the intersection of surveillance and AI, gaining insights into the market and how control rooms are evolving.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.