classic | mobile
Follow us on:
Follow us on Facebook  Share via Twitter  Share via LinkedIn
 

Search...
Hi-Tech Security Solutions Business Directory
Residential Estate Security Handbook 2018


Key components of access control
November 2018, Access Control & Identity Management, Integrated Solutions

Access control was a growth market worldwide over the past year, posting healthier growth than surveillance, although the surveillance market is much larger in terms of revenues. The reason for the growth, or one of them at least, is that access control is no longer simply opening and closing a door.

Today, selling readers and cards is a margin game with lots of competition. On the other hand, just buying access control is a budget game and if all you’re buying is getting people in and out the door then why bother going for a brand when there are plenty of cheaper alternatives.

Dan Drayton.
Dan Drayton.

The question is, is opening and closing doors all you should be looking at when selling or buying access control today? Hi-Tech Security Solutions approached Dan Drayton, international sales manager at Paxton Access, for some insights into what matters in access control decisions.

Starting at the beginning, we asked what companies looking to purchase a new or upgrade an existing access infrastructure should be considering before signing on the dotted line.

“When thinking about implementing or upgrading an access control solution there are a few key elements to consider,” Drayton answers. “In essence, access control is intelligently opening and closing doors, but this should be done based on how you want people to flow through your building. This can be as simple as setting specific times when doors are permanently open or locked based on factors such as risk and busy or quiet periods.

“Critically important is the simplicity of the software. Operators of an access control system can frequently change so the administration of the system must be simple and intuitive. Regulatory awareness, such as utilising access control on fire and escape routes, must comply with regulations.”

Finally, he says consideration should be given to system quality, post-sales support and warranties. Access control is a critical component of building security, however faults or issues with the system can cause huge disruption for building users.

Integration is a must

In addition to the above, Drayton also believes buyers should consider additional functionality and features that could be better suited to their specific situations. In Paxton’s case, “Our product range covers wireless and wired IP access control, including IP video intercoms, so clients can have a fully integrated access control solution from a single vendor, without any licence fees (Paxton has removed all licence fees from its product offerings for life). Our system and software are widely recognised as the simplest to install, commission and operate, and come with a hassle-free five-year swop out warranty.”

Similarly, the ability for access systems to integrate with other brands as well as other security systems (and even IoT systems), is as important. Paxton has recently noted an increase in requests for integration between biometric readers from one brand and the access control backbone from another.

Drayton adds that it is useful for surveillance and access control to work in harmony, enabling alarms and alerts from access control to be matched to the visual evidence. “Intelligent buildings are, without question, the future of our industry where all building services work in harmony, with little interaction from the user. This can be achieved in many ways that provide different benefits to the user, so it’s important that consumers have a clear idea on what they want from their system to get the most from it.”

This extends to selecting a system and provider that can adapt with the user as needs change. Users should look to work with companies that are investing in technology and bringing it to market, providing confidence that whatever type of access control is required can be catered for.

Managing your identities

Arguably, the most important part of an access solution is the database that contains the people and permissions assigned to them in terms of where and what they can access. The process to follow in setting up and maintaining this database differs when smaller companies are compared to large enterprises, however, the key is to have a single, accurate and reliable source of access and identity information.

“Access control systems, like most other technology, are only as good as the quality of information they contain,” notes Drayton. “A company’s HR database is quite straightforward to integrate into an access control system in order to add/delete users and administer privileges. In smaller organisations, it is common to have the access control database as a standalone hub of information. This is where software simplicity is critical, removing barriers to administrators, keeping all user data up to date to minimise risk.

“Paxton Access is a manufacturer of IP access control and video door intercom systems,” states Drayton. “Unique to South Africa, we have a no licence fee approach to our software for the life of the installation. Paxton trains more than 500 people each year in South Africa, free of charge, to specify, install and commission our systems. This ensures installers have all the tools needed to provide excellent service and solutions to the end user. We also have free phone after sales support service backed up by our hassle free, five-year, swap out warranty for all products.”


Credit(s)
  Share via Twitter   Share via LinkedIn      

Further reading:

  • Directory of access and identity management suppliers 2019
    November 2018, Access Control & Identity Management

  • Open source identity initiative
    November 2018, Access Control & Identity Management
    Industry-first open source identity initiative promises to eliminate vendor lock-in and reduce costs for governments around the world.
  • Significant differences in ­perceptions on state of digital trust
    November 2018, CA Southern Africa, Access Control & Identity Management, Security Services & Risk Management
    Nearly half of businesses admit to selling customer data, despite claiming data ­protection as paramount; consumer behaviour shows strong correlation between loss of business and lack of digital trust.
  • Trust but continually verify
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Hi-Tech Security Solutions looks at access and identity management and asks some industry players what ‘zero trust’ and ‘least privilege’ access means.
  • Physical/logical convergence
    November 2018, Technews Publishing, This Week's Editor's Pick, Cyber Security, Integrated Solutions, IT infrastructure
    The convergence between physical and logical (or cyber) security will be a game-changer because it will change the way we do everything, from planning to design and all the way to installation and maintenance.
  • Physical and logical convergence is a fact
    November 2018, This Week's Editor's Pick, Integrated Solutions, IT infrastructure
    Convergence, the next buzzword? A dated buzzword? Is convergence ­merely ­integration on steroids? What is convergence?
  • The expanding role of IT in access control
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, IT infrastructure
    What role is IT playing in the world of physical access control and how far will its role expand in future?
  • Taking augmented identity to the world
    November 2018, Technews Publishing, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    Hi-Tech Security Solutions spoke to Gary Jones, VP Global Channel and Marketing biometric access and time solutions) at IDEMIA (formerly Morpho) about his career with the company and its new vision of Augmented Identity.
  • A scan of fingerprint biometrics
    November 2018, Technews Publishing, Access Control & Identity Management
    Given the increase in the use of fingerprint technology in public and private organisations, as well as some recent announcements on the reliability or lack or reliability of certain types of sensors and algorithms in the fingerprint biometric market, Hi-Tech Security Solutions spoke to some of the leading fingerprint biometric vendors in the market to find out more about the state of this market.
  • BIMS set to change identity ­management
    November 2018, Technews Publishing, Access Control & Identity Management, Integrated Solutions, IT infrastructure
    Local biometrics integrator, Ideco Biometric Security Solutions, has announced that its Biometric Identity Management System (BIMS) has been launched to market.
  • Tracking biometrics into a brave new digital world
    November 2018, This Week's Editor's Pick, Access Control & Identity Management, Integrated Solutions
    The industry is increasingly transitioning from unimodal to more integrated multimodal biometric solutions for more accurate identity verification and faster real-time results.
  • Panasonic’s Face Recognition Server
    November 2018, Panasonic South Africa, Access Control & Identity Management, CCTV, Surveillance & Remote Monitoring, Products
    Panasonic has adopted deep learning technology in its face recognition products that overcomes the difficulties of conventional technologies.

 
 
         
Contact:
Technews Publishing (Pty) Ltd
1st Floor, Stabilitas House
265 Kent Ave, Randburg, 2194
South Africa
Publications by Technews
Dataweek Electronics & Communications Technology
Electronic Buyers Guide (EBG)

Hi-Tech Security Solutions
Hi-Tech Security Business Directory (HSBD)

Motion Control in Southern Africa
Motion Control Buyers’ Guide (MCBG)

South African Instrumentation & Control
South African Instrumentation & Control Buyers’ Guide (IBG)
Other
Terms & conditions of use, including privacy policy
PAIA Manual
         
    Mobile | Classic

Copyright © Technews Publishing (Pty) Ltd. All rights reserved.