Physical access control - in consideration technology

October 2002 Access Control & Identity Management

Access control and IT are increasingly becoming more integrated, bringing rise to certain factors that need to be taken into account when considering such technology. In acquiring an access control system that will meet the needs of either a small organisation, or a large enterprise, there are obvious issues where businesses need to be asking crucial questions. Given that many of the access control vendors in the physical security world are not necessarily IT-driven, particularly so in South Africa where local content proliferates, it is even more so a case of 'buyer beware'.

So, in consideration of access control technology, what are the right questions to ask? Cardax's Julie Howarth poses a few.

* Is the system scalable? Will the system meet the needs of a small, single site, right through to a global enterprise? Making it easy to increase the size of your system, as required, calls for all systems to use the same architecture and hardware. Are future upgrades easily accommodated? Future upgrades will be accommodated if the controlling devices support downloadable code.

* How can the system be customised? The look and feel of the system should be consistent with the requirements of the organisation. Does the system involve optional features? Optional features, such as PhotoID, mean that an organisation can select the necessary functionality, independent of the physical size of their system.

* Does the system allow for the sharing of information? It is essential to determine how easily the access control system will interface into other third party systems, determining the use of systems such as CCTV, time and attendance packages, human resource systems, asset management systems, and building management systems. Greater interoperability between systems, devices, and applications are now expected in order to allow for further integration. For instance, logical access control of a computer network, through logon functions, can be linked with physical access control.

* How does the system impact on the network? Does the system reside on an organisation's existing intranet or wide area network (WAN)? Utilising existing networks provides cost savings to an organisation. However, the system should be designed with the IT environment in mind, and should use minimal bandwidth. Sophisticated systems should still only use small packet sizes, regardless of functionality such as intercoms or digital cameras. Is the system Internet compatible? Being Internet compatible may mean that the system can work across geographical and time zone boundaries. Remote dial-up operation enables cost-effective monitoring of remote locations within the system.

* Does the system incorporate encryption? Protecting the system's data is paramount for an access control system. There may be an optional feature of additional encryption, to 128 bits or preferably 168-bit encryption.

* Does the system support smartcards? Smartcards are an option for linking physical access control with logical access control, to network resources. A multi-application smartcard incorporates personal identification for physical access control systems, and computer systems, and certificates for proof of identity. The card can also store physical and/or behavioural characteristics (biometrics signatures) for automatic personal identity verification.

Cardax

Cardax has been designing and marketing sophisticated, enterprise-wide access control systems for more than two decades. CardaxFT is the company's latest generation technology and, with the future in mind, extends the boundaries to a complete, integrated, enterprise-wide security system, taking into consideration the issues outlined.

For more information contact Cardax South Africa, 011 467 2149, salesafrica@cardax.com





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

You cannot bribe a computer
Access Control & Identity Management Security Services & Risk Management
Corruption is a cancer that destroys the prospects and stability of countries and businesses. It widens wealth gaps and punishes the poor. It costs countries many billions in lost revenue.

Read more...
Heightening physical security at military base
Turnstar Systems Access Control & Identity Management Government and Parastatal (Industry) Products
Turnstar Systems recently installed two 3-metre Velocity Raptor traffic spikes at the South African National Defence Force (SANDF) Randfontein military base on Gauteng’s West Rand.

Read more...
Zero Trust to dominate 2023
Cyber Security Access Control & Identity Management
Traditional ways of safeguarding data are no longer sufficient in 2023. Zero Trust has emerged as a more proactive way for businesses to keep their systems, data, and networks protected against compromise.

Read more...
Turnstar opens an office in the UK
Turnstar Systems News Access Control & Identity Management
Turnstar Systems recently established an office in the Greater Manchester borough in the North East of England, as part of the company’s ongoing expansion strategy.

Read more...
Enkulu Technologies to distribute Brazil’s Control iD
News Access Control & Identity Management Products
Enkulu Technologies has been appointed as the first South African distributor of Control iD products; a Brazilian company offering a T&A range of solutions based on its range of biometric products.

Read more...
HID Technology Seminar
Technews Publishing HID Global News Access Control & Identity Management Products
HID Global’s technology seminar introduced partners and distributors to the company’s new Signo range of readers and highlighted the benefits and global growth of mobile access credentials.

Read more...
Celebrating a successful year
Gallagher Technews Publishing News Access Control & Identity Management Products
Gallagher Security hosted an end-of year event at the Steyn City Equestrian Centre in which it thanked its partners for another successful year and provided a glimpse into what the company will be releasing in 2023.

Read more...
Innovation and service, 37 years and counting
Technews Publishing Impro Technologies Access Control & Identity Management Integrated Solutions
Innovation, simplicity and trust underpin the nearly 40 years of success of local access control brand, Impro Technologies, which is still run as an independent entity despite being acquired by ASSA ABLOY in 2016.

Read more...
Access control for one of Britain’s oldest boarding schools
Access Control & Identity Management Education (Industry) Products
In 2022, Christ’s Hospital School, which hosts 18 boarding houses on site, needed to replace its access control security system with a new solution that would be simple to manage and maintain.

Read more...
Improving safety and security
Gallagher Education (Industry) Access Control & Identity Management Integrated Solutions
Education facilities have more than enough to deal with when it comes to allocating budget. Security often seems to be the last item on the agenda but is more important than ever.

Read more...