Access control is the key to integration for businesses

June 2007 Access Control & Identity Management

An access control solution can be as simple as the use of electronic cards instead of keys to unlock a front door.

This limited functionality still retains a considerable level of value. In most cases, businesses can limit which cards are able to access the door during specific times, thus allowing all employees to have 'keys to the shop' without risking unwanted access to the premise.

At the other end of the spectrum is a fully integrated system, controlling multiple buildings, and which incorporates the functionality of the CCTV, fire alarm, electronic visitor management, lighting, HRIS, asset management, intrusion detection, elevator control and other systems as may be appropriate.

The benefits of a well-planned, properly specified and cost-efficient access control solution for any building or site are numerous.

Besides preventing unwanted visitors and minimising risk to stock and equipment, effective access control also safeguards against costly and potentially disastrous business interruption.

In this world of technology, security systems are evolving quickly, offering more features and greater levels of integration. Indeed, security systems work best when functioning as a holistic solution to meet site-specific risks, where their full potential can be realised. That means integrating equipment such as CCTV cameras and recorders, access control, electronically monitored perimeter fencing, and intruder alarms.

In the past, true systems integration used to be the exclusive preserve of a small number of end-user companies willing to pay large amounts of money for high-level functionality. Typically, it was delivered by specialist systems integrators with strong engineering teams, who had the breadth and depth of technical expertise required to bring together a range of disparate products from independent CCTV, access control and intruder manufacturers to create a fully integrated security system.

Problems encountered in matching different system control protocols led to difficulties in enabling these systems to 'talk' to each other. Various solutions attempted to resolve this 'language barrier' as system suppliers sought the key to unlocking the benefits of inter-operability in that sector.

However, over the last few years, the market situation has begun to change, driven by the increasing consolidation of the industry. This has resulted in enhancements in manufacturer offerings to enable them to operate on common systems platforms. What was once a technical nightmare of different protocols and technological incompatibility is increasingly becoming a 'plug-and-play' solution, where the in-built technology manages all aspects of integration.

Leading security organisations are now placing the emphasis on access control systems as the absolute integration platform. Instead of access control, intruder and CCTV systems working in near isolation from each other, they can now be networked and centrally, or remotely, monitored and controlled via an access control solution. Easy integration starts at camera systems linked into the graphical user interface of the access control software. This way, daily operations can be managed without having to switch between separate software systems. Practical examples of this include CCTV cameras that can be programmed to position themselves and record automatically if triggered by detector activation, such as a fire door being opened. The operator would see a pop-up on the screen at alarm events such as these, in addition to a live camera view or easy retrieval of historic event images with a simple click of the mouse.

At larger sites, where security staff and building managers operate from a control room, this level of integration also offers a greater level of supervisory capability to improve the overall efficiency and effectiveness of daily operations. Additionally, security officers can be better deployed, monitored and supported as they perform both routine site checks and specific incident response duties during out-of-hours periods such as overnight, weekends and bank holidays. Similar detector activations can lead to alarms being raised at a monitoring station located anywhere around the world. Jeremy Kimber, Honeywell's UK marketing leader for video and access advises: "A typical example of this type of application is in a major financial institution which has an integrated access and CCTV system installed in their head office and their unmanned disaster recovery centre (DRC) site. Whenever an organisation's staff members use their access cards at the DRC, it automatically triggers video pop-ups on the system at head office allowing the central security team to visually verify and remotely manage all visitors to the DRC.

Leveraging off an access control solution provides the ability to easily and rapidly implement new technology solutions such as smart cards, biometrics, and intelligent video into existing architectures as needs change.

Indeed, true integration can offer far more functionality than just the security of an organisations' people and premises; it can extend to envelop all aspects of a business including cashless vending, storing personal information, control of access to restricted areas, keeping a record of accumulated points for discount purchases and verifying authenticity.

While the level of sophistication will vary in accordance with budget and requirements, an integrated solution is within any company's reach and is undoubtedly the new standard for any company serious about their security.



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...