Physical access control - in consideration technology

October 2002 Access Control & Identity Management

Access control and IT are increasingly becoming more integrated, bringing rise to certain factors that need to be taken into account when considering such technology. In acquiring an access control system that will meet the needs of either a small organisation, or a large enterprise, there are obvious issues where businesses need to be asking crucial questions. Given that many of the access control vendors in the physical security world are not necessarily IT-driven, particularly so in South Africa where local content proliferates, it is even more so a case of 'buyer beware'.

So, in consideration of access control technology, what are the right questions to ask? Cardax's Julie Howarth poses a few.

* Is the system scalable? Will the system meet the needs of a small, single site, right through to a global enterprise? Making it easy to increase the size of your system, as required, calls for all systems to use the same architecture and hardware. Are future upgrades easily accommodated? Future upgrades will be accommodated if the controlling devices support downloadable code.

* How can the system be customised? The look and feel of the system should be consistent with the requirements of the organisation. Does the system involve optional features? Optional features, such as PhotoID, mean that an organisation can select the necessary functionality, independent of the physical size of their system.

* Does the system allow for the sharing of information? It is essential to determine how easily the access control system will interface into other third party systems, determining the use of systems such as CCTV, time and attendance packages, human resource systems, asset management systems, and building management systems. Greater interoperability between systems, devices, and applications are now expected in order to allow for further integration. For instance, logical access control of a computer network, through logon functions, can be linked with physical access control.

* How does the system impact on the network? Does the system reside on an organisation's existing intranet or wide area network (WAN)? Utilising existing networks provides cost savings to an organisation. However, the system should be designed with the IT environment in mind, and should use minimal bandwidth. Sophisticated systems should still only use small packet sizes, regardless of functionality such as intercoms or digital cameras. Is the system Internet compatible? Being Internet compatible may mean that the system can work across geographical and time zone boundaries. Remote dial-up operation enables cost-effective monitoring of remote locations within the system.

* Does the system incorporate encryption? Protecting the system's data is paramount for an access control system. There may be an optional feature of additional encryption, to 128 bits or preferably 168-bit encryption.

* Does the system support smartcards? Smartcards are an option for linking physical access control with logical access control, to network resources. A multi-application smartcard incorporates personal identification for physical access control systems, and computer systems, and certificates for proof of identity. The card can also store physical and/or behavioural characteristics (biometrics signatures) for automatic personal identity verification.

Cardax

Cardax has been designing and marketing sophisticated, enterprise-wide access control systems for more than two decades. CardaxFT is the company's latest generation technology and, with the future in mind, extends the boundaries to a complete, integrated, enterprise-wide security system, taking into consideration the issues outlined.

For more information contact Cardax South Africa, 011 467 2149, [email protected]





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...
A passwordless future?
Access Control & Identity Management
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals.

Read more...