Access control the key to integration for businesses

Access & Identity Management Handbook 2007 Access Control & Identity Management

An access control solution can be as simple as the use of electronic cards instead of keys to unlock a front door.

This limited functionality still retains a considerable level of value. In most cases, businesses can limit which cards are able to access the door during specific times, thus allowing all employees to have ‘keys to the shop’ without risking unwanted access to the premise.

At the other end of the spectrum is a fully integrated system, controlling multiple buildings, and which incorporates the functionality of the CCTV, fire alarm, electronic visitor management, lighting, HR information system, asset management, intrusion detection, elevator control and other systems as may be appropriate.

The benefits of a well-planned, properly specified and cost-efficient access control solution for any building or site are numerous and include:

* Protection of a facility.

* Limit access to restricted areas eg, server rooms.

* Monitoring and control of remote locations.

* Security for staff and visitors.

* Controlling and reporting on any access movement.

* Tracking and tracing people for evacuation purposes.

Besides preventing unwanted visitors and minimising risk to stock and equipment, effective access control also safeguards against costly and potentially disastrous business interruption.

In this world of technology, security systems are evolving quickly, offering more features and greater levels of integration.

Integration through the ages

In the past, true systems integration used to be the exclusive preserve of a small number of end-user companies willing to pay large amounts of money for high-level functionality. Typically, it was delivered by specialist system integrators with strong engineering teams, who had the breadth and depth of technical expertise required to bring together a range of disparate products from independent CCTV, access control and intruder manufacturers to create a fully integrated security system.

Problems encountered in matching different system control protocols led to difficulties in enabling these systems to ‘talk’ to each other. Various solutions attempted to resolve this ‘language barrier’ as system suppliers sought the key to unlocking the benefits of interoperability in that sector.

Current integration

Leading security organisations are now placing the emphasis on access control systems as the absolute integration platform. Instead of access control, intruder and CCTV systems working in near isolation from each other, they can now be networked and centrally, or remotely, monitored and controlled via an access control solution. Easy integration starts at camera systems linked into the graphical user interface of the access control software. This way, daily operations can be managed without having to switch between separate software systems. Practical examples of this include CCTV cameras that can be programmed to position themselves and record automatically if triggered by detector activation, such as a fire door being opened. The operator would see a pop-up on the screen at alarm events such as these, in addition to a live camera view or easy retrieval of historic event images with a simple click of the mouse.

At larger sites, where security staff and building managers operate from a control room, this level of integration also offers a greater level of supervisory capability to improve the overall efficiency and effectiveness of daily operations. Additionally, security officers can be better deployed, monitored and supported as they perform both routine site checks and specific incident response duties during out-of-hours periods such as overnight, weekends and bank holidays. Similar detector activations can lead to alarms being raised at a monitoring station located anywhere around the world.

Leveraging off an access control solution provides the ability to easily and rapidly implement new technology solutions such as smartcards, biometrics, and intelligent video into existing architectures as needs change. This, in turn, enables the following benefits:

* Streamlined employee attendance tracking process.

* Site occupancy reporting capabilities.

* Total resource intelligence.

* Smarter facilities, security and workforce management.

* Scalable network architecture accommodates new technology.

Indeed, true integration can offer far more functionality than just the security of an organisations’ people and premises; it can extend to envelop all aspects of a business including cashless vending, storing personal information, control of access to restricted areas, keeping a record of accumulated points for discount purchases and verifying authenticity.

While the level of sophistication will vary in accordance with budget and requirements, an integrated solution is within any company’s reach and is undoubtedly the new standard for any company serious about their security.

For more information contact Honeywell Security UK, www.honeywell.com/security/uk





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Econz Wireless Timecard assists with employee screening
Issue 4 2020 , Access Control & Identity Management
Essential workers across a wide range of sectors are using Econz’ Timecard application to check employees’ current wellness status before starting work.

Read more...
WizzPass COVID-19 screening solution
Issue 4 2020 , Access Control & Identity Management
WizzPass provides COVID-19 screening solution for both staff and visitors in one system.

Read more...
Foot operated door opener
Issue 4 2020 , Access Control & Identity Management
Pro-Tech and Falcon Security have launched the new Foot Operated Door Opener (FODO), aimed at assisting in the creation of touchless ‘hands-free’ access control solutions.

Read more...
Infection control access solutions
Issue 4 2020, Gunnebo Africa , Access Control & Identity Management
With many organisations planning to resume operations, the implementation of social distancing and infection control in these environments is a challenge.

Read more...
Protecting staff with contact tracing software
Issue 4 2020 , Access Control & Identity Management
Gallagher’s latest development, the Proximity and Contact Tracing Report, is supporting organisations with fast and efficient contact tracing during the COVID-19 pandemic.

Read more...
Suprema enhances cybersecurity
Issue 4 2020, Suprema , Access Control & Identity Management
Suprema BioStar 2 is a web-based, open and integrated security platform that provides comprehensive functionality for access control and time and attendance.

Read more...
Visitor management for businesses and office parks
Issue 4 2020 , Access Control & Identity Management
Managing visitors is an essential security task for organisations of all sizes, but especially large businesses that need to keep tabs on who enters and exits their premises and their reason for being ...

Read more...
Weatherproof Bluetooth padlock
Issue 4 2020, ASSA ABLOY South Africa , Access Control & Identity Management
The new ABLOY BEAT locking solution includes a novel digital key, a mobile app and an IP68-rated, weatherproof Bluetooth padlock.

Read more...
Touch-free face recognition terminals
Issue 4 2020, Hikvision South Africa , Access Control & Identity Management
Hikvision announces touch-free MinMoe face recognition terminals for easier access control and time and attendance.

Read more...
Contactless T&A
Issue 4 2020, LD Africa , Access Control & Identity Management
Matrix COSEC APTA is a mobile-based employee portal, allowing COSEC users to monitor and manage all their time and attendance, total working hours and leave options.

Read more...