Web-based access control

Access & Identity Management Handbook 2011 Access Control & Identity Management

Staying in control of your building wherever you are.

“The fundamentals of good security have not changed, even if the technology has,” says Ingo Mutinelli, national sales manager for Elvey Security Technologies.

Until recently, access control and security fell into one of two camps. If you are a large organisation and could afford a 24-hour manned central response centre you could reliably secure and monitor the sites within your organisation. If you could not afford this, you outsourced your monitoring and response to a third party. This can still be a relatively expensive option and involves a loss of control to the user.

The first consideration for most business, large or small, is preventing criminals from getting into the building. This need is best met today by an IP-based, integrated security solution that includes a strong access control element. While physical guarding remains one of the most popular forms of security, there is no escaping the human factor.

“Weak links in the security chain are created by the gaps left by honest guards on patrol as well as by bent guards persuaded to look the other way while criminals walk out with laptops, desktops and every other imaginable company asset,” says Mutinelli.

These events can be eradicated with a web-based solution which allows you to control and monitor your security requirements even if you have multiple sites. From one central point, names can be added, restrictions sanctioned and visitors granted access. The database can be managed from an office in, say, Johannesburg, and still control staff movement in Cape Town, which adds hugely to the system’s flexibility.

One of the most exciting aspects of web-based security is the capacity of the system to be the centre of an integrated solution that can manage most aspects of a building. It is possible to combine a number of security devices onto a single platform, which includes access control, CCTV, intrusion and fire, along with guard monitoring and is administered via a web browser giving the user the impression that they are on a single web page.

Building security and administrators can manage up to 64 doors in the building, print ID cards, run reports and view alarms using a standard web browser on any networked PC or laptop, giving the security manager more control over the building and not confining him to the building’s control room.

The user friendly system can be set up to simply advise departmental managers on the status of activity at their facility by sending notifications of alarms/events via e-mail, PDA (personal digital assistant) or mobile phone, keeping them in the loop in their absence.

For more information contact Elvey Security Technologies, +27 (0)11 401 6700, [email protected], www.elvey.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Pentagon appointed as Milestone distributor
Elvey Security Technologies News & Events Surveillance
Milestone Systems appointed Pentagon Distribution (an Elvey Group company within the Hudaco Group of Companies) as a distributor. XProtect’s open architecture means no lock-in and the ability to customise the connected video solution that will accomplish the job.

Read more...
Defending against SIM swap fraud
Access Control & Identity Management
Mobile networks must not be complacent about SIM swap fraud, and they need to prioritise the protection of customers, according to Gur Geva, Founder and CEO of iiDENTIFii.

Read more...
Access Selection Guide 2024
Access Control & Identity Management
The Access Selection Guide 2024 includes a range of devices geared specifically for the access control and identity management market.

Read more...
Biometrics Selection Guide 2024
Access Control & Identity Management
The Biometrics Selection Guide 2024 incorporates a number of hardware and software biometric identification systems aimed at the access and identity management market of today.

Read more...
Smart intercoms for Sky House Projects
Nology Access Control & Identity Management Residential Estate (Industry)
DNAKE’s easy and smart intercom solution has everything in place for modern residential buildings. Hence, the developer selected DNAKE video intercoms to round out upmarket apartment complexes, supported by the mobile app.

Read more...
Authentic identity
HID Global Access Control & Identity Management
As the world has become global and digital, traditional means for confirming authentic identity, and understanding what is real and what is fake have become impractical.

Read more...
Research labs secured with STid Mobile ID
Access Control & Identity Management
When NTT opened its research centre in Silicon Valley, it was looking for a high-security expert capable of protecting the company’s sensitive data. STid readers and mobile ID solutions formed part of the solution.

Read more...
Is voice biometrics in banking secure enough?
Access Control & Identity Management AI & Data Analytics
As incidents of banking fraud grow exponentially and become increasingly sophisticated, it is time to question whether voice banking is a safe option for consumers.

Read more...
Unlocking efficiency and convenience
OPTEX Access Control & Identity Management Transport (Industry)
The OVS-02GT vehicle detection sensor is the newest member of Optex’s vehicle sensor range, also known as ‘virtual loop’, and offers reliable motion detection of cars, trucks, vans, and other motorised vehicles using microwave technology.

Read more...
Protecting our most vulnerable
NEC XON Access Control & Identity Management Products & Solutions
In a nation grappling with the distressing rise in child kidnappings, the need for innovative solutions to protect our infants has never been more critical. South Africa finds itself in the throes of a child abduction pandemic.

Read more...