Access control the key to integration for businesses

Access & Identity Management Handbook 2007 Access Control & Identity Management

An access control solution can be as simple as the use of electronic cards instead of keys to unlock a front door.

This limited functionality still retains a considerable level of value. In most cases, businesses can limit which cards are able to access the door during specific times, thus allowing all employees to have ‘keys to the shop’ without risking unwanted access to the premise.

At the other end of the spectrum is a fully integrated system, controlling multiple buildings, and which incorporates the functionality of the CCTV, fire alarm, electronic visitor management, lighting, HR information system, asset management, intrusion detection, elevator control and other systems as may be appropriate.

The benefits of a well-planned, properly specified and cost-efficient access control solution for any building or site are numerous and include:

* Protection of a facility.

* Limit access to restricted areas eg, server rooms.

* Monitoring and control of remote locations.

* Security for staff and visitors.

* Controlling and reporting on any access movement.

* Tracking and tracing people for evacuation purposes.

Besides preventing unwanted visitors and minimising risk to stock and equipment, effective access control also safeguards against costly and potentially disastrous business interruption.

In this world of technology, security systems are evolving quickly, offering more features and greater levels of integration.

Integration through the ages

In the past, true systems integration used to be the exclusive preserve of a small number of end-user companies willing to pay large amounts of money for high-level functionality. Typically, it was delivered by specialist system integrators with strong engineering teams, who had the breadth and depth of technical expertise required to bring together a range of disparate products from independent CCTV, access control and intruder manufacturers to create a fully integrated security system.

Problems encountered in matching different system control protocols led to difficulties in enabling these systems to ‘talk’ to each other. Various solutions attempted to resolve this ‘language barrier’ as system suppliers sought the key to unlocking the benefits of interoperability in that sector.

Current integration

Leading security organisations are now placing the emphasis on access control systems as the absolute integration platform. Instead of access control, intruder and CCTV systems working in near isolation from each other, they can now be networked and centrally, or remotely, monitored and controlled via an access control solution. Easy integration starts at camera systems linked into the graphical user interface of the access control software. This way, daily operations can be managed without having to switch between separate software systems. Practical examples of this include CCTV cameras that can be programmed to position themselves and record automatically if triggered by detector activation, such as a fire door being opened. The operator would see a pop-up on the screen at alarm events such as these, in addition to a live camera view or easy retrieval of historic event images with a simple click of the mouse.

At larger sites, where security staff and building managers operate from a control room, this level of integration also offers a greater level of supervisory capability to improve the overall efficiency and effectiveness of daily operations. Additionally, security officers can be better deployed, monitored and supported as they perform both routine site checks and specific incident response duties during out-of-hours periods such as overnight, weekends and bank holidays. Similar detector activations can lead to alarms being raised at a monitoring station located anywhere around the world.

Leveraging off an access control solution provides the ability to easily and rapidly implement new technology solutions such as smartcards, biometrics, and intelligent video into existing architectures as needs change. This, in turn, enables the following benefits:

* Streamlined employee attendance tracking process.

* Site occupancy reporting capabilities.

* Total resource intelligence.

* Smarter facilities, security and workforce management.

* Scalable network architecture accommodates new technology.

Indeed, true integration can offer far more functionality than just the security of an organisations’ people and premises; it can extend to envelop all aspects of a business including cashless vending, storing personal information, control of access to restricted areas, keeping a record of accumulated points for discount purchases and verifying authenticity.

While the level of sophistication will vary in accordance with budget and requirements, an integrated solution is within any company’s reach and is undoubtedly the new standard for any company serious about their security.

For more information contact Honeywell Security UK, www.honeywell.com/security/uk





Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Choosing the right biometric technology in the new normal
Issue 9 2020, IDEMIA , Access Control & Identity Management
Selecting the right biometric data that delivers according to your requirements is crucial to ongoing success. So, how do we select the appropriate biometrics to meet our needs?

Read more...
Keeping COVID in check
Issue 8 2020, Suprema , Access Control & Identity Management, Healthcare (Industry)
Suprema thermal camera solution helps prevent the spread of COVID-19 in South Korea in a focused healthcare approach from government.

Read more...
Scorpion Spike Barriers for St Helena Bay
Issue 8 2020, BoomGate Systems , Access Control & Identity Management
The Port of St Helena Bay, along the west coast of South Africa, gets a security upgrade in the form of the Scorpion High Security Spike Barrier.

Read more...
Gallagher unveils new T30 access reader
Issue 8 2020, Gallagher , Access Control & Identity Management
Gallagher has launched the new T30 card and PIN reader with two-factor authentication, designed to offer an extra layer of security without the display screen.

Read more...
Speeding into the office
Issue 8 2020, Turnstar Systems , Access Control & Identity Management
The Firs commercial property is situated in the heart of Rosebank – Johannesburg’s second largest business centre – surrounded by new commercial, residential and retail property developments. Rosebank ...

Read more...
Paxton introduces Checkpoint Control
Issue 8 2020, Paxton , Access Control & Identity Management
Paxton’s new Checkpoint Control feature supports COVID-secure sites and helps Net2 users protect employees and visitors by monitoring and approving people as they enter buildings.

Read more...
Turnstar secures MTN
Issue 8 2020, Turnstar Systems , Access Control & Identity Management
Turnstar Velocity barriers and Velocity Raptor spike vehicle barriers form part of the physical access solutions that secure the MTN head office in Johannesburg.

Read more...
Net2 integrates with additional thermal scanners
Issue 8 2020, Paxton , News, Access Control & Identity Management
Paxton has updated Net2 to include six new thermal temperature scanning integrations to assist in managing the pandemic.

Read more...
Touchless access control conference
Issue 8 2020, Hikvision South Africa, IDEMIA , Suprema, Technews Publishing , Access Control & Identity Management, Conferences & Events, Training & Education
Hi-Tech Security Solutions hosted an online conference in mid-August to highlight the new trend towards touchless access control. The conference hosted speakers with experience in the access control, ...

Read more...
VisionPass wins SIA award
Issue 8 2020, IDEMIA , News, Access Control & Identity Management
IDEMIA announced that VisionPass, its newly launched advanced facial recognition device, won the SIA New Product Showcase Award.

Read more...