The new age of access control

November 2011 Access Control & Identity Management

Integrated access solutions deliver the best results.

Access control has become a vital component of any security concept worldwide. The protection of intellectual property rights, prevention of theft and sabotage or simply compliance requirements – there are a multitude of reasons why companies of all kinds need to use a comprehensive access control system to restrict, manage and control access to their facilities.

However, operated in isolation from other safety and security systems, even the most sophisticated access control system cannot really live up to its promises. In such an environment, operation and monitoring can quickly turn into a nightmare, as each system has its own architecture, its own user interface and its own management tool. This is why more organisations are looking out for an access control solution that easily integrates with video monitoring, intrusion detection and sometimes even visitor management to form a homogeneous security system with a consistent user interface and central management and operations.

Gone are the days (or at least they should be), when a gatekeeper made a digital yes/no decision whenever somebody required access to a company’s premises. Today, companies need to manage access on a completely different basis. They need to define clearly who may enter which parts of the campus or individual buildings and they must also ensure that access is only granted at times when it is needed.

Further, suppliers are more often faced with requirements of their customers to supply a documentation of all access attempts, whether successful or not, to protect against industrial espionage. To fulfil this requirement, not only employee access must be captured and recorded, but also the entire visitor traffic. In some industries there are also compliance issues enforcing integration of visitor management – for example in the European food industry for certification against IFS-5. In addition to basic visitor management, it may also be desirable to have forced guidance along certain routes, control of singling systems such as turnstiles and weight sensors, anti-passback features, guard tour modules and others.

Video integration for more safety

While modern access control systems allow an efficient management of access rights, they are rather powerless against abuse if operated on their own. If an employee or visitor passes on his card, the illegitimate recipient inherits all his access permissions. Tailgating is another issue that standard access control systems do not address. In critical environments, it is therefore mandatory to add a second layer of security by integrating access control with some kind of video surveillance. To prevent abuse, all access requests can then trigger one or more video cameras.

Who is really standing at this rarely used backdoor? Who is trying to gain access to the warehouse right now with a card that was reported as lost? In an integrated environment, operating personnel can answer these kinds of questions with just a mouse click, ensuring a more rapid reaction to such events.

Integrated systems can also provide alarm verification, instantly displaying live video images from nearby cameras when there is an alarm event at a door – such as when a person presents an unauthorised credential or when a door is forced open. With this capability, the operator does not even need to know which camera to select to investigate the event, as integrated systems can be configured to automatically display the appropriate video on the screen.

This level of instant response can improve the overall performance of a customer’s security staff. Security personnel do not need to go to the site of an event to look into an alarm. They can view video of the event from their workstations and positively identify the cause – only going to the alarm location when follow-up is necessary. This reduces the amount of time security personnel spend away from their workstations and better prepares them with an understanding of the situation when they do need to visit the location. Some access control systems do even offer the same functionality to verify alarms of an integrated intrusion detection system.

Forensics can also benefit from such integration if the video recordings are referenced in the access control system’s event log. Such a feature greatly facilitates identification, retrieval and playback of past events and alarms if necessary. Systems offering pre and post alarm recording options also enable the operator to see video from immediately before and after the alarm event to better judge the situation. However, often the settings of surveillance cameras are less than optimal for the specific event, and therefore it is desirable to have the ability to change these settings without operator intervention. This could allow an access event to prompt a PTZ camera to move into a pre-set position or cause a DVR to record at a higher frame rate to capture more details of the event.

Prompting higher-quality recordings ensures the video resolution is sufficient for thorough investigation of access events. Local recording or archiving of live images or video clips from integrated video storage devices is also possible with most systems, giving customers the ability to capture individual snapshots related to important events.

Open standards ease integration

Integrating access control, video monitoring, and intrusion detection can be rather easy when all components come from the same vendor, and if this vendor also offers a management platform for all of them. However, this is rarely the case. In many applications, you will find individual systems from different vendors for each of these tasks.

In this case, integration can be a nightmare if the integrator has to develop interfaces between the individual systems and do a lot of programming. In today’s installations, it is therefore mandatory to select and install systems based on open and accepted standards which can easily be integrated by means of a central building management system as an umbrella. Most current systems use proven IT technologies such as TCP/IP and OPC for communications with such a management system.

Integrated systems ‘off the shelf’ can greatly ease installation and configuration of the security solution. Logical integration eliminates the need for multiple software platform and interfaces – resulting in fewer complications and greater event-driven functionality as well as reduced installation time and costs. What is more, this kind of integration also promises more efficient operation and a clearly reduced need for training, but above all also a higher security level.

An open standards-based management system even makes sense in those cases where one vendor supplies everything, as it opens up the entire installation for future expansion.

User interface is key

However, these benefits do not necessarily come by default. While technical systems may be quite efficient, if users cannot properly operate them, they will not deliver to the promise. An integrated security system is a very complex apparatus, and if this complexity is not hidden from the user, the system will be highly prone to human error and faulty operation. Such systems do need very clear and intuitive user interfaces, avoiding information overload while offering all the information that is currently needed.

This is even more important when several components or dialogs are open, which will often be the case if you deal with access control, video surveillance and maybe intrusion detection from the same console.

Secure the security system

When planning an integrated system, functionality and ease of use are certainly the most important aspects. However, it is also worth having a chat with the IT department, as for them such a system is another complex application that they need to support. And what is more, it is a mission-critical application.

Security systems need to meet defined uptime requirements and, in the case of live video, also guaranteed bandwidth. In some cases, strict uptime requirements will enforce fault-tolerant and redundant configurations which the system must support. Being a critical application, the security system itself needs to be secured against unauthorised access by means of IT security technologies.

For more information contact Bosch Security Systems - South Africa & Sub-Sahara Africa, +27 (0)11 651 9818, elaine.ogorman@za.bosch.com, www.boschsecurity.co.za


Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Bosch to acquire the building automation specialist GFR
August 2019, Bosch Building Technologies , News
Bosch to buy GFR with its complete building automation solutions as well as related services and a comprehensive hardware and software product portfolio.

Read more...
HID addresses identification challenges at ID4Africa
August 2019 , News, Access Control & Identity Management, Government and Parastatal (Industry)
Being able to verify people’s identities is critical for a nation’s growth and prosperity and yet HID says nearly half of all African citizens can’t prove who they are to vote, travel freely and receive government benefits and services.

Read more...
Came acquires Turkish company Özak
August 2019, CAME BPT South Africa , News, Access Control & Identity Management
Came broadens its market horizons and signals growth and consolidation in the Middle East.

Read more...
The benefits of electronic visitor management
August 2019, Powell Tronics , Access Control & Identity Management, Residential Estate (Industry)
Access control is a critical aspect of estate security as it represents the controls put in place to restrict entry (and possibly exit) along the outer boundary of the location.

Read more...
Addressing risks by means of access control layout and design
August 2019 , Access Control & Identity Management, Security Services & Risk Management
In order to develop a suitable, practical and appropriate security system for any organisation, it is essential to first develop a master security and life safety plan strategy.

Read more...
Secure hands-free access
August 2019, Suprema , Access Control & Identity Management, Residential Estate (Industry)
Suprema’s facial biometric terminals bring no-touch access into secure residential estates, high-rise apartments and luxury homes providing fast, easy and intuitive user authentication with the added benefit of hygiene.

Read more...
MorphoAccess Sigma Extreme
August 2019, IDEMIA , Products, Access Control & Identity Management
MorphoAccess Sigma Extreme from IDEMIA is a touchscreen device with multiple recognition device interfaces (NFC chip reader, PIN and BioPIN codes, contactless card readers).

Read more...
Outdoor access terminals
August 2019, Suprema , Access Control & Identity Management, Residential Estate (Industry), Products
Rugged, dust- and weather-proof access control solutions that provide exceptional durability in extreme conditions is a strong requirement for many residential estates.

Read more...
Future-facing cameras
August 2019, Bosch Building Technologies , Products, CCTV, Surveillance & Remote Monitoring
All FLEXIDOME IP starlight 8000i cameras feature built-in Intelligent Video Analytics, making them intuitive, and elevates their importance far beyond security alone.

Read more...
MorphoWave Compact
August 2019, IDEMIA , Products, Access Control & Identity Management
The MorphoWave Compact captures and matches four fingerprints on either the right or left hand in any direction. It is robust to environmental factors such as extreme light or dust.

Read more...