A revolution in access control

Access & Identity Management Handbook 2009 Access Control & Identity Management

Access control has come a long way and been through many changes. Jack Edery, CEO of Elvey Security Technologies, believes it is about to undergo even more dramatic changes, all for the benefit of users.

Jack Edery
Jack Edery

Centuries ago, people’s access and egress to properties was probably controlled with large stones placed at cave entrances. Then guards, walls and moats succeeded this most basic form of access control. The process became mechanised with the use of wooden bolts and keys, thought to trace back thousands of years to the early Egyptians.

Over the years, as the need to protect family and property intensified, wood was replaced with metal, security locks took over from tumbler locks, and then came various versions of combination locks and time-locking mechanisms. The arrival of the computer and then the Internet changed the face of access control forever.

“With this new technology, systems could easily be reconfigured and access tag and cards were far more cheaply replaced than bunches of keys. There was also no denying the convenience of having only one tag to access multiple entry points within a building,” says Jack Edery, CEO of Elvey Security Technologies. “On top of that, access control systems could now provide records of all exits and entries, and data could be extracted from an electronic access control system into a payroll system.”

Used with growing confidence and success around the world, people could have been forgiven for thinking that analogue technology was here to stay, says Edery, highlighting its reliability and affordability. Yet he has little doubt that the future of access control lies in IP-based video surveillance. “If we look at the development of CCTV equipment, where analogue is fast being supplemented or replaced with IP (Internet Protocol), I have no doubt that access control is following the same trend,” he asserts.

Advantages

IP technology started making its presence felt in the access control market in 2007 and its popularity is soaring on the back of its many advantages. These include easy and cost-effective central database interrogation via local and wide area networks as well as easy and cost-effective integration with other systems. It also requires less cabling, which has huge cost-saving implications for installations in new buildings, owing to the type and amount of cabling required.

Highly adaptable, IP also becomes a reliable, functional hybrid when combined with access control and other applications such as building management, CCTV and time-and-attendance systems, for which Edery says there is growing demand.

Other factors that Zane Greeff; Elvey’s technical director sees driving IP technology into more businesses around the world are its cost-saving potential on the larger sites, user-friendliness and infrastructure simplification.

Zane Greef
Zane Greef

”Today’s electronic access control systems face a number of challenges. For one, sites are getting bigger, hence the need for more users on a system. This increases product, implementation and installation costs as well as makes the overall system more complicated to operate,” he says. “This is particularly true of installations that would have required every foot to be wired with copper.”

Another major departure from the traditional electronic access control system is that the IP-based or digital access control system is Web-based. Says Greeff, “In many instances, programming, viewing of data and reports can be done on the network using standard Web browsers.”

For all the new technology’s advantages, however, he warns that its benefits are directly linked to the following:

* The reliability of the company network.

* The overall security of the company network against unauthorised access and hackers.

* Power supply, whether traditional or PoE (Power over Ethernet) – especially in the event of power-cut or load shedding.

* The choice of system designer and installer, which both need to have adequate knowledge of security and network environments using TCP/IP.

“That IP access control is readily available is a given,” Greeff says. “The challenge is to balance the cost aspect of it. IP readers, which links directly to the company network, and are expensive since each unit has its own network port and electronic components.”

Accordingly, his advice to those wanting the best combination of cost-efficiency and efficacy is to use a networkable (TCP/IP ready) multidoor controller. He sketches the following picture: “Think of the controller as the computer controlling the access. Then picture a group of doors and readers connected to it with traditional or RS485 connection. The controller (and there can be more than one) in turn, connects through the network to the mainframe computer or server in the control room.”

Another key advantage of using IP as a transmission medium is that the cabling typically already exists in most businesses and residential markets today, says Michael Brett, Elvey’s national sales manager. “If it does not, installing Ethernet cabling is not expensive. Furthermore, computer networks allow users to make use of standard PC servers for video management and storage; PCs for controlling the security and access control systems, which ultimately makes the systems easier to use and understand. It is generally easier to work your way through a software programme than it is working with a user manual.”

Michael Brett
Michael Brett

The solution

According to Elvey integration specialist Francois Smuts, the way to ensure better convergence and integration between CCTV and access control security systems sharing the same TCP/IP network is to implement a number of small dedicated sub-systems that are linked via the company’s existing network. As these systems make use of existing company network infrastructures, the end results with regard to implementation, cost, complexity of design and installation time, are all improved. On sites that are more complex though, he recommends the installation of a separate network to counter possible problems surrounding the integrity and load pressure on the existing network.

This has proved to be a welcome solution for high-risk operations that have multiple sites or branches around the country.

“By connecting the various branches’ access control systems to the company’s existing network, the security manager is able to manage all access from one central point. Because he only requires a handful of operators to administer the entire system (as opposed to having one operation in each site), the risk of confidential information falling into the hands of the wrong people is greatly reduced. What’s more, head office is able to control non-employees’ access privileges to the various sites far more effectively.

“In the past, end-users would often complain about how complicated it was to use administration software, especially when it came with additional features and capabilities that manufacturers sometimes built in to justify the price. Although these features can be necessary in high-security environments, it was frequently a case of over-kill for the small to medium-size companies.”

Bigger is not better

Cutting-edge technology aside, users of access control systems are also buying into aesthetics. According to Smuts, people are paying more attention than ever to the appearance of their premises. “As a result, we are increasingly being called on to supply compact, non-intrusive access control and security systems,” he says. “The trend is definitely toward small, wireless devices which offer substantial cost savings owing to their ease of installation and limited cabling requirements.”

In summary, Brett says that the rise in costs today is forcing companies to reduce costs, which IP will do while enhancing security at all levels since network devices can be monitored individually for connectivity. The other major benefit of IP is the fact that one is able to deploy redundancy for transmission making use of secure wireless infrastructure as well as cellular infrastructure.

“And we are not the only ones who believe that IP is the future. Predictions by Rune Gustavsson of the American Department of Software Engineering and Computer Science (IPD) and Societies of Computation (SoC) estimated in 1997 that the number of PCs in the world was around 60 million, a figure he expected to rise to around 350 million by 2010. In support of this, according to him, was the number of devices that were network-equipped in 1997 amounted to around 10 million, which was likely to reach 3000 million by 2010.”



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Centurion raises the bar at HomeSec Expo
Centurion Systems News & Events Access Control & Identity Management Residential Estate (Industry) Smart Home Automation Commercial (Industry)
Centurion Systems unveiled its latest product lines at HomeSec Expo 2026, introducing SMART+, a simpler way for installers and end users to manage their Centurion installations - as well as a few new products.

Read more...
What’s in store for PAM and IAM?
Access Control & Identity Management Information Security
Leostream predicts changes in Identity and Access Management (IAM) and Privileged Access Management (PAM) in the coming year, driven by evolving cybersecurity realities, hybridisation, AI, and more.

Read more...
Protecting citizens’ identities: a shared responsibility
Access Control & Identity Management
A blind spot in identity authentication today is still physical identity documents. Identity cards, passports, and driver’s licences, biometric or not, are broken, forged, or misused, fueling global trafficking networks and undermining public trust in institutions.

Read more...
The challenges of cybersecurity in access control
Technews Publishing SMART Security Solutions Access Control & Identity Management Information Security
SMART Security Solutions summarises the key points dealing with modern cyber risks facing access control systems, from Mercury Security’s white paper “Meeting the Challenges of Cybersecurity in Access Control: A Future-Ready Approach.”

Read more...
Access as a Service is inevitable
Technews Publishing SMART Security Solutions ATG Digital Access Control & Identity Management Infrastructure
When it comes to Access Control as a Service (ACaaS), most organisations (roughly 90% internationally) plan to move, or are in the process of moving to the cloud, but the majority of existing infrastructure (about 70%) remains on-premises for now.

Read more...
From surveillance to insight across Africa
neaMetrics TRASSIR - neaMetrics Distribution Access Control & Identity Management Surveillance Products & Solutions
TRASSIR is a global developer of intelligent video management and analytics solutions, delivering AI-driven platforms that enable organisations to monitor, analyse, and respond to events across complex physical environments.

Read more...
Securing your access hardware and software
SMART Security Solutions Technews Publishing RBH Access Technologies Access Control & Identity Management Information Security
Securing access control technology is critical for physical and digital security. Every interaction between readers, controllers, and host systems creates a potential attack point for those with nefarious intent.

Read more...
Access trends for 2026
Technews Publishing SMART Security Solutions RR Electronic Security Solutions Enkulu Technologies IDEMIA neaMetrics Editor's Choice Access Control & Identity Management Infrastructure
The access control and identity management industry has been the cornerstone of organisations of all sizes for decades. SMART Security Solutions asked local integrators and distributors about the primary trends in the access and identity market for 2026.

Read more...
Access data for business efficiency
Continuum Identity Editor's Choice Access Control & Identity Management AI & Data Analytics Facilities & Building Management
In all organisations, access systems are paramount to securing people, data, places, goods, and resources. Today, hybrid systems deliver significant added value to users at a much lower cost.

Read more...
Luxury residential access
Access Control & Identity Management Residential Estate (Industry)
Clifftown Shore is an exclusive collection of 51 luxury 1, 2 and 3-bedroom seafront apartments and penthouses set within a protected conservation park area, served by CAME’s XiP system and door entry system.

Read more...










While every effort has been made to ensure the accuracy of the information contained herein, the publisher and its agents cannot be held responsible for any errors contained, or any loss incurred as a result. Articles published do not necessarily reflect the views of the publishers. The editor reserves the right to alter or cut copy. Articles submitted are deemed to have been cleared for publication. Advertisements and company contact details are published as provided by the advertiser. Technews Publishing (Pty) Ltd cannot be held responsible for the accuracy or veracity of supplied material.




© Technews Publishing (Pty) Ltd. | All Rights Reserved.