Key components of access control

Access & Identity Management Handbook 2019 Access Control & Identity Management, Integrated Solutions

Access control was a growth market worldwide over the past year, posting healthier growth than surveillance, although the surveillance market is much larger in terms of revenues. The reason for the growth, or one of them at least, is that access control is no longer simply opening and closing a door.

Today, selling readers and cards is a margin game with lots of competition. On the other hand, just buying access control is a budget game and if all you’re buying is getting people in and out the door then why bother going for a brand when there are plenty of cheaper alternatives.

Dan Drayton.
Dan Drayton.

The question is, is opening and closing doors all you should be looking at when selling or buying access control today? Hi-Tech Security Solutions approached Dan Drayton, international sales manager at Paxton Access, for some insights into what matters in access control decisions.

Starting at the beginning, we asked what companies looking to purchase a new or upgrade an existing access infrastructure should be considering before signing on the dotted line.

“When thinking about implementing or upgrading an access control solution there are a few key elements to consider,” Drayton answers. “In essence, access control is intelligently opening and closing doors, but this should be done based on how you want people to flow through your building. This can be as simple as setting specific times when doors are permanently open or locked based on factors such as risk and busy or quiet periods.

“Critically important is the simplicity of the software. Operators of an access control system can frequently change so the administration of the system must be simple and intuitive. Regulatory awareness, such as utilising access control on fire and escape routes, must comply with regulations.”

Finally, he says consideration should be given to system quality, post-sales support and warranties. Access control is a critical component of building security, however faults or issues with the system can cause huge disruption for building users.

Integration is a must

In addition to the above, Drayton also believes buyers should consider additional functionality and features that could be better suited to their specific situations. In Paxton’s case, “Our product range covers wireless and wired IP access control, including IP video intercoms, so clients can have a fully integrated access control solution from a single vendor, without any licence fees (Paxton has removed all licence fees from its product offerings for life). Our system and software are widely recognised as the simplest to install, commission and operate, and come with a hassle-free five-year swop out warranty.”

Similarly, the ability for access systems to integrate with other brands as well as other security systems (and even IoT systems), is as important. Paxton has recently noted an increase in requests for integration between biometric readers from one brand and the access control backbone from another.

Drayton adds that it is useful for surveillance and access control to work in harmony, enabling alarms and alerts from access control to be matched to the visual evidence. “Intelligent buildings are, without question, the future of our industry where all building services work in harmony, with little interaction from the user. This can be achieved in many ways that provide different benefits to the user, so it’s important that consumers have a clear idea on what they want from their system to get the most from it.”

This extends to selecting a system and provider that can adapt with the user as needs change. Users should look to work with companies that are investing in technology and bringing it to market, providing confidence that whatever type of access control is required can be catered for.

Managing your identities

Arguably, the most important part of an access solution is the database that contains the people and permissions assigned to them in terms of where and what they can access. The process to follow in setting up and maintaining this database differs when smaller companies are compared to large enterprises, however, the key is to have a single, accurate and reliable source of access and identity information.

“Access control systems, like most other technology, are only as good as the quality of information they contain,” notes Drayton. “A company’s HR database is quite straightforward to integrate into an access control system in order to add/delete users and administer privileges. In smaller organisations, it is common to have the access control database as a standalone hub of information. This is where software simplicity is critical, removing barriers to administrators, keeping all user data up to date to minimise risk.

“Paxton Access is a manufacturer of IP access control and video door intercom systems,” states Drayton. “Unique to South Africa, we have a no licence fee approach to our software for the life of the installation. Paxton trains more than 500 people each year in South Africa, free of charge, to specify, install and commission our systems. This ensures installers have all the tools needed to provide excellent service and solutions to the end user. We also have free phone after sales support service backed up by our hassle free, five-year, swap out warranty for all products.”



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Coordinated efforts lead to successful crime response
News & Events Surveillance Integrated Solutions
A synchronised operation involving Vumacam’s control room operators, the Johannesburg Metropolitan Police Department (JMPD), and 24/7 Drone Force, resulted in the successful identification and apprehension of a suspect linked to a reported theft case.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Luxury residential access
Access Control & Identity Management Residential Estate (Industry)
Clifftown Shore is an exclusive collection of 51 luxury 1, 2 and 3-bedroom seafront apartments and penthouses set within a protected conservation park area, served by CAME’s XiP system and door entry system.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.