Access control - choosing the correct system

June 2002 Access Control & Identity Management

An access control system is there to protect lives and property so time taken at this stage is worth it to make sure you are making the right choice.

Whether you are an end-user or an installation company making recommendations to a client, it is worthwhile asking the following questions about the proposed system - before you commit yourself.

First of all, is the system manufactured according to some form of standard such as SABS, CE, UL, etc? Products manufactured to a recognised standard offer a certain guarantee of quality, which would normally not be found in products not manufactured according to any standards.

Next, does the system operate on a distributed database? A true distributed database system offers:

* Parallel processing of events at reader/controller level.

* Increased speed of operation.

* Full off-line operation in the event of computer failure.

* Date and time stamping of all transactions for more than 24 hours without transaction duplication.

If you are an end-user ask your installer for an organogram of his company as well as the supply chain of product from manufacturer. This will indicate capacity and capability of the company and the manufacturer or distributor to provide technical support and back-up. If you are an installer, be prepared to provide this sort of information to clients.

Does the system use an open system architecture in terms of software database such as SQL Server, or MS Access and an industry standard 26 bit Wiegand card reader interface? Systems adhering to this requirement will provide the most flexibility for current and future expansion and connectivity.

Make sure you are aware of any hidden costs such as:

* Annual software licence fees.

* Software upgrade fees.

* Firmware upgrade fees.

* Mandatory maintenance agreements.

Upgrading

You need to ask the right questions regarding whether or not the system is modularly upgradeable - for example:

* How easily can the number of card readers be expanded? Can you upgrade to the next version of software without any hardware changes and can you add on software modules such as photo-ID, alarm monitoring, CCTV, time and attendance, multiple dial-up sites, and TCP/IP connectivity if you need to at a later stage?

* Does the manufacturer offer backwards compatibility in terms of both software and hardware? This will ensure that the system is not made redundant through new releases of software and hardware.

* What form of surge protection is offered against mains power borne transient spikes and lightning strikes?

* Does the manufacturer offer a website where new software releases and firmware upgrades are downloadable, thereby making it an easy process to upgrade the system on-line?

Finally, if you are an end-user ask for a list of reference sites, and phone them.

For further details contact Nigel Versfeld, TeqTrader on tel: 011 403 3002.





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...
Understanding the power of digital identity
Access Control & Identity Management Security Services & Risk Management Financial (Industry)
The way we perceive business flourishing is undergoing a paradigm shift, as digital identity and consumer consent redefine the dynamics of transactions, says Shanaaz Trethewey.

Read more...