The access edge

Access & Identity Management Handbook 2018 Editor's Choice, Access Control & Identity Management, Integrated Solutions, Security Services & Risk Management

With the common denominator of IP networks as their backbone, building automation, security and, in particular, access control systems are increasingly coming together, providing both security integrators and building managers opportunities to work in concert on time-, cost-, and problem-saving solutions.

Whether integrators have just dipped their toes into the water of adding building automation to their list of services or are fully embracing the convergence of security and building automation systems, the myriad data that these systems put forth, often through a shared protocol such as BACnet or SNMP, make it possible to create not only a safe building, but a smarter and more energy-efficient one as well.

The intersection of energy-saving with smart building objectives can often ride on the information supplied by access control data. By knowing the occupancy of a particular building or sector within a structure, captured through entry and/or exit readers, it now becomes possible to implement heating and cooling, lighting, and fresh air ventilation controls based on the number and location of individuals.

With heating and cooling systems, the best savings come in seldom-used areas, where the HVAC system can operate in standby mode, rather than being subjected to a particular on-off schedule. While such an operation isn’t recommended for a large-scale heating system – you wouldn’t want to heat up the entire building for just one person coming in on a weekend – it can be advantageous in areas where occupancy minimums are more easily reached.

Access control systems can be programmed to control lighting circuits based on occupancy. Once a card is presented to the reader, the system can then begin turning on the appropriate lights based on where that person’s office is located. And unlike motion sensors, which can also be used to control lights, there is no minimum ‘on’ times with a programmed system, so once a person logs out, the lights go off.

A breath of fresh air

Ventilation is another component of the energy-saving capabilities tied to access control. While the amount of fresh air in a building is governed by building codes, it is usually expressed in the amount of fresh air per minute per person. So, if the number of people in an area can be measured via the access control system, then the amount of fresh air can be adjusted, saving the expense of conditioning that outside air.

Deploying access control data can also serve as a planning tool for future building projects, either within the existing structure or when considering expansion or reuse of a property. Having the details on occupancy – who is on site, what hours is the building most used, are there areas that are underused or too crowded? – can become a tool for bottom-line decisions about a company’s real estate expenses.

Likewise, such information can be used in day-to-day planning, such as knowing how many people are likely to be at work so security details, parking attendants and cafeteria workers can be scheduled accordingly. And in companies where shared workspace is becoming more prevalent, access data can also help when assigning desks or conference rooms to individuals and groups.

The modern memo

Because of the interactive nature of today’s access control systems, employees can receive necessary information through the same system that is logging their comings and goings. Touchscreens have the ability to provide messages, whether they are alerts about an urgent matter, notices about training programmes, or changes in company policy, or just updates on events, such as a companywide meeting. Readers can also become tools for booking rooms, or through the use of a built-in intercom, communicating with security personnel in an emergency.

Mobile apps tied to the access control system add yet another layer to building automation by allowing users to remotely unlock doors, receive mobile alerts, and provide two-factor authentication for access to higher security areas. Apps now and into the future will likely get cardholders even more involved with the buildings, allowing them to provide instant feedback and notifications.

Additionally, the integration of video enhances both smart building capabilities and security by making alarms visually verifiable, which increases the safety of occupants by better assessing their location and situation. Video can also help reduce false alarms and using video analytics can provide further data on building usage trends.

Preparation is key

The opportunity within building automation for the traditional security integrator rests in the ability to prepare properly for entering this new realm. Although the technology convergence makes it possible for security personnel to participate, there still needs to be a commitment of time, resources, and planning, especially in the arena of employing IT-savvy staff.

Security integrators eager to embrace building automation can often enter the field by taking on projects similar to burgeoning smart home/security projects around energy or lighting. Yet even with multiple crossover opportunities, there may be silos of specialisation for both security and building automation providers that require them to do certain tasks independently while still developing an integrated solution.

For more information contact Johnson Controls Security Products, +27 (0)82 566 5274, emallett@tycoint.com, www.tycosecurityproducts.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Making a mesh for security
Information Security Security Services & Risk Management
Credential-based attacks have reached epidemic levels. For African CISOs in particular, the message is clear: identity is now the perimeter, and defences must reflect that reality with coherence and context.

Read more...
From friction to trust
Information Security Security Services & Risk Management Financial (Industry)
Historically, fraud prevention has been viewed as a trade-off between robust security and a seamless customer journey, with security often prevailing. However, this can impair business functionality or complicate the customer journey with multiple logins and authentication steps.

Read more...
Security ready to move out of the basement
AI & Data Analytics Security Services & Risk Management
Panaseer believes that in 2026, a board member at a major corporation will lose their job amid rising breaches and legal scrutiny, as organisations recognise that cyber risk is a business risk that CISOs cannot shoulder alone.

Read more...
Cyber remains top business risk, but AI fastest riser at #2
News & Events Security Services & Risk Management
The Allianz Risk Barometer 2026 ranks cybersecurity, especially ransomware attacks, as the #1 risk, while AI is the biggest riser and jumps from #10 to #2, highlighting the emerging risks for companies in almost all industry sectors.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Beyond the fence
Technews Publishing Fang Fences & Guards SMART Security Solutions Perimeter Security, Alarms & Intruder Detection Access Control & Identity Management
In a threat landscape characterised by sophisticated syndicates, harsh environmental conditions, and unstable power grids, a static barrier is no longer a defence; it is merely a brief delay.

Read more...
Zero Trust access control
Technews Publishing SMART Security Solutions CASA Software NEC XON Editor's Choice Access Control & Identity Management Information Security
Zero Trust Architecture enforces the rule of ‘never trust, always verify’. It changes an organisation’s security posture by assuming that threats exist both inside and outside the perimeter, and it applies to information and physical security.

Read more...
OT calculator to align cyber investments with business goals
Industrial (Industry) Information Security Security Services & Risk Management
The OT Calculator has been developed specifically for industrial organisations to assess the potential costs of insufficient operational technology (OT) security. By offering detailed financial forecasts, the calculator empowers senior management to make well-informed decisions.

Read more...
Gallagher releases Command Centre v9.40
Gallagher Products & Solutions Integrated Solutions
Gallagher Security has released Command Centre v9.40, introducing new capabilities for the Controller 7000 product range and supporting optional licencing expansion to up to 24 doors per controller, more than doubling the previous limit of 10.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.