Access module eases admittance

Access & Identity Management Handbook 2017 Access Control & Identity Management, Integrated Solutions

When Turvatiimi moved to new premises at the Flamingo Shopping and Entertainment Center in the suburbs of Helsinki, a new automated access control system was needed.

Turvatiimi have multiple offices at the premises, meaning that a total of 19 doors must have secured access. Employees will move between the offices throughout the day and the company has a high number of visitors daily. A traditional reception or access control system would be impractical to handle this flow of people due to Turvatiimi Oyj’s high security level needs.

All persons entering or leaving have to be identified; visitors have to be handled securely and efficiently, with no tailgaiting of visitors, misused access cards or spoofing of access. These are all inherent risks with traditional access control systems.

Hi-Sec Supply installed 18 cameras (Axis M3007, P8514, M3014, M3005 and P1425-LE) and 19 Axis A1001 Access Control units for controlling the doors. All are controlled by Milestone XProtect Professional video management software (VMS) with full integration to the Axis A1001 door controllers using the Milestone Access Control Module with Axis integration. All employees now have access tokens that can be used at all locations. The system integrates fully with the Responda 113 alarm system, ensuring rapid and informed response if unauthorised access is detected.

The Advantage: the Milestone video-enabled access control system enables Turvatiimi Oyj to keep track of all persons on the premises, while at the same time provide excellent service to visitors. An employee expecting a visitor will get a notification upon the arrival of the visitor, with a picture. This ensures that all persons at the premises are identified. The system will link access to a door with the video from a camera. In this way the identity of a person entering or leaving is ensured. If access tokens are swapped, it can be detected. Tailgating can also be detected through the use of the video verification. Visitors who are temporary staff such as workmen can be identified and tracked if attempting to access the premises during unauthorised hours or to access-restricted areas.

Need for secure but easy access

Turvatiimi realised that a traditional access control system would not be a viable solution for the company because of their need for a high-security solution. Traditional panel-based access control systems require expensive, high-maintenance control panels to convey information and often use proprietary hardware that does not integrate with other systems. It is important to understand that a traditional access control system is only registering events based on the control panel. It might detect that a PIN code is used, but the system is unable to detect if it is an authorised person typing the PIN code. If an incorrect PIN code is disclosed, the security of the system is compromised.

Access control systems using cards or security tokens suffer from the same type of weakness, as cards may be lost, stolen or swapped. Again the system is only able to detect that a certain card has accessed a card reader. If a card or a PIN code has been used to gain unauthorised access, any video security system can only be used to detect unauthorised entry after the fact, unless a manned solution is used.

A video-integrated digital solution based on Ethernet cabling for data and power simplifies installation and offers a higher level of security because the video can link a person to an event, such as a door being accessed. The integration between an access control system and a VMS (Video Management Software) enables a unified operation if the VMS client is used for controlling access, because the visual identification is an added level of security to the access control system.

The extended security and the simplified operation were the main reasons for choosing the integrated Axis/Milestone solution for Turvatiimi. Use of the Milestone Mobile client simplifies operations further and all employees can verify request for access if needed.

The recordings and access control data are kept for two to three weeks in case of the need for investigation of an access event. Furthermore, the use of Milestone XProtect VMS with its open platform technology enables Turvatiimi to add analytics as needed. An example of this could be people counting, giving the exact number of persons at their premises at all times. This is essential information in case of fire or other emergencies.

Initially the system was implemented in Turvatiimi’s headquarters with 50 employees. The rest of the 25 locations are to follow.

Integrated access solutions

The Finnish corporate landscape is currently being shaped by a rising number of small-to-medium-sized enterprises. This has led to increased construction activity in the commercial sector and raised the demand for integrated and efficient security solutions.

The ability to integrate alarms, access control and video security is a key to keep costs down and improve efficiency in alarm handling. If incidents can be documented using integrated access and video security systems, then guarding services can be better informed and thereby more efficient. It could be that a door has been kept open by a contractor or it could be a malfunction of a door-closing mechanism. Video verifies the situation for more appropriate response to alarms.

For more information contact Milestone Systems, +27 (0)82 377 0415, arms@milestonesys.com, www.milestonesys.com



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Luxury residential access
Access Control & Identity Management Residential Estate (Industry)
Clifftown Shore is an exclusive collection of 51 luxury 1, 2 and 3-bedroom seafront apartments and penthouses set within a protected conservation park area, served by CAME’s XiP system and door entry system.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.