The new age of access control

Access & Identity Management Handbook 2012 Access Control & Identity Management

Integrated access solutions deliver the best results.

Access control has become a vital component of any security concept worldwide. The protection of intellectual property rights, prevention of theft and sabotage or simply compliance requirements – there are a multitude of reasons why companies of all kinds need to use a comprehensive access control system to restrict, manage and control access to their facilities.

However, operated in isolation from other safety and security systems, even the most sophisticated access control system cannot really live up to its promises. In such an environment, operation and monitoring can quickly turn into a nightmare, as each system has its own architecture, its own user interface and its own management tool. This is why more organisations are looking out for an access control solution that easily integrates with video monitoring, intrusion detection and sometimes even visitor management to form a homogeneous security system with a consistent user interface and central management and operations.

Gone are the days (or at least they should be), when a gatekeeper made a digital yes/no decision whenever somebody required access to a company’s premises. Today, companies need to manage access on a completely different basis. They need to define clearly who may enter which parts of the campus or individual buildings and they must also ensure that access is only granted at times when it is needed.

Further, suppliers are more often faced with requirements of their customers to supply a documentation of all access attempts, whether successful or not, to protect against industrial espionage. To fulfil this requirement, not only employee access must be captured and recorded, but also the entire visitor traffic. In some industries there are also compliance issues enforcing integration of visitor management – for example in the European food industry for certification against IFS-5. In addition to basic visitor management, it may also be desirable to have forced guidance along certain routes, control of singling systems such as turnstiles and weight sensors, anti-passback features, guard tour modules and others.

Video integration for more safety

While modern access control systems allow an efficient management of access rights, they are rather powerless against abuse if operated on their own. If an employee or visitor passes on his card, the illegitimate recipient inherits all his access permissions. Tailgating is another issue that standard access control systems do not address. In critical environments, it is therefore mandatory to add a second layer of security by integrating access control with some kind of video surveillance. To prevent abuse, all access requests can then trigger one or more video cameras.

Who is really standing at this rarely used backdoor? Who is trying to gain access to the warehouse right now with a card that was reported as lost? In an integrated environment, operating personnel can answer these kinds of questions with just a mouse click, ensuring a more rapid reaction to such events.

Integrated systems can also provide alarm verification, instantly displaying live video images from nearby cameras when there is an alarm event at a door – such as when a person presents an unauthorised credential or when a door is forced open. With this capability, the operator does not even need to know which camera to select to investigate the event, as integrated systems can be configured to automatically display the appropriate video on the screen.

This level of instant response can improve the overall performance of a customer’s security staff. Security personnel do not need to go to the site of an event to look into an alarm. They can view video of the event from their workstations and positively identify the cause – only going to the alarm location when follow-up is necessary. This reduces the amount of time security personnel spend away from their workstations and better prepares them with an understanding of the situation when they do need to visit the location. Some access control systems do even offer the same functionality to verify alarms of an integrated intrusion detection system.

Forensics can also benefit from such integration if the video recordings are referenced in the access control system’s event log. Such a feature greatly facilitates identification, retrieval and playback of past events and alarms if necessary. Systems offering pre and post alarm recording options also enable the operator to see video from immediately before and after the alarm event to better judge the situation. However, often the settings of surveillance cameras are less than optimal for the specific event, and therefore it is desirable to have the ability to change these settings without operator intervention. This could allow an access event to prompt a PTZ camera to move into a pre-set position or cause a DVR to record at a higher frame rate to capture more details of the event.

Prompting higher-quality recordings ensures the video resolution is sufficient for thorough investigation of access events. Local recording or archiving of live images or video clips from integrated video storage devices is also possible with most systems, giving customers the ability to capture individual snapshots related to important events.

Open standards ease integration

Integrating access control, video monitoring, and intrusion detection can be rather easy when all components come from the same vendor, and if this vendor also offers a management platform for all of them. However, this is rarely the case. In many applications, you will find individual systems from different vendors for each of these tasks.

In this case, integration can be a nightmare if the integrator has to develop interfaces between the individual systems and do a lot of programming. In today’s installations, it is therefore mandatory to select and install systems based on open and accepted standards which can easily be integrated by means of a central building management system as an umbrella. Most current systems use proven IT technologies such as TCP/IP and OPC for communications with such a management system.

Integrated systems ‘off the shelf’ can greatly ease installation and configuration of the security solution. Logical integration eliminates the need for multiple software platform and interfaces – resulting in fewer complications and greater event-driven functionality as well as reduced installation time and costs. What is more, this kind of integration also promises more efficient operation and a clearly reduced need for training, but above all also a higher security level.

An open standards-based management system even makes sense in those cases where one vendor supplies everything, as it opens up the entire installation for future expansion.

User interface is key

However, these benefits do not necessarily come by default. While technical systems may be quite efficient, if users cannot properly operate them, they will not deliver to the promise. An integrated security system is a very complex apparatus, and if this complexity is not hidden from the user, the system will be highly prone to human error and faulty operation. Such systems do need very clear and intuitive user interfaces, avoiding information overload while offering all the information that is currently needed.

This is even more important when several components or dialogs are open, which will often be the case if you deal with access control, video surveillance and maybe intrusion detection from the same console.

Secure the security system

When planning an integrated system, functionality and ease of use are certainly the most important aspects. However, it is also worth having a chat with the IT department, as for them such a system is another complex application that they need to support. And what is more, it is a mission-critical application.

Security systems need to meet defined uptime requirements and, in the case of live video, also guaranteed bandwidth. In some cases, strict uptime requirements will enforce fault-tolerant and redundant configurations which the system must support. Being a critical application, the security system itself needs to be secured against unauthorised access by means of IT security technologies.

For more information contact Bosch Security Systems - South Africa & Sub-Sahara Africa, +27 (0)11 651 9818, [email protected],


Share this article:
Share via emailShare via LinkedInPrint this page

Further reading:

Gallagher to showcase new Controller 7000 single door
Technews Publishing Access Control & Identity Management Products
Gallagher will be showcasing its latest access control innovation, the Controller 7000 Single Door on its stand at Intersec Dubai from 17-19 January 2023.

Smart parking management platform
Access Control & Identity Management Asset Management, EAS, RFID
Parket builds a seamless bridge between supply and the ever-increasing, but fluid – and often temporary – demand for parking bays.

Visible-light facial recognition terminal
ZKTeco Access Control & Identity Management Products
The SpeedFace-V5L [P] is a visible-light facial recognition terminal using intelligently engineered facial recognition algorithms and the latest computer vision technology.

Facial and palm verification
ZKTeco Access Control & Identity Management Products
The ProFace X [P] supports both facial and palm verification, with a large capacity and rapid recognition.

Glide Master High Security 90° Sliding Gate
BoomGate Systems Access Control & Identity Management Products
Boomgate Systems was asked to make a sliding gate that can turn 90 degrees. The gate had to offer high security and be vandal-proof.

Informing, entertaining and communicating across your landscape
Evolving Management Solutions Access Control & Identity Management
For the first time, the attraction of large shopping malls with many stores, entertainment and food courts no longer offers enough appeal to attract customers.

Suprema’s new BioStation 3
Suprema Access Control & Identity Management Products
The brand new BioStation 3 is not only Suprema’s smallest face recognition device to date, but it also comes packed with the largest variety of features.

Suprema renews international privacy and security standard certifications
Suprema News Access Control & Identity Management
Suprema has simultaneously renewed two important international standard certifications regarding information security management (ISO/IEC 27001) and privacy information management (ISO/IEC 27701).

SuperVision biometric access control
Integrated Solutions Access Control & Identity Management Products
SuperVision is a time & attendance (T&A) biometric access control system Fourier IT has been developing and enhancing for 18 years.

Manage energy usage with Paxton access control
Paxton Access Control & Identity Management Products
Paxton provides access control systems that can integrate with existing infrastructure and manage a building’s energy-consuming activities to save energy and costs.