Key components of access control

Access & Identity Management Handbook 2019 Access Control & Identity Management, Integrated Solutions

Access control was a growth market worldwide over the past year, posting healthier growth than surveillance, although the surveillance market is much larger in terms of revenues. The reason for the growth, or one of them at least, is that access control is no longer simply opening and closing a door.

Today, selling readers and cards is a margin game with lots of competition. On the other hand, just buying access control is a budget game and if all you’re buying is getting people in and out the door then why bother going for a brand when there are plenty of cheaper alternatives.

Dan Drayton.
Dan Drayton.

The question is, is opening and closing doors all you should be looking at when selling or buying access control today? Hi-Tech Security Solutions approached Dan Drayton, international sales manager at Paxton Access, for some insights into what matters in access control decisions.

Starting at the beginning, we asked what companies looking to purchase a new or upgrade an existing access infrastructure should be considering before signing on the dotted line.

“When thinking about implementing or upgrading an access control solution there are a few key elements to consider,” Drayton answers. “In essence, access control is intelligently opening and closing doors, but this should be done based on how you want people to flow through your building. This can be as simple as setting specific times when doors are permanently open or locked based on factors such as risk and busy or quiet periods.

“Critically important is the simplicity of the software. Operators of an access control system can frequently change so the administration of the system must be simple and intuitive. Regulatory awareness, such as utilising access control on fire and escape routes, must comply with regulations.”

Finally, he says consideration should be given to system quality, post-sales support and warranties. Access control is a critical component of building security, however faults or issues with the system can cause huge disruption for building users.

Integration is a must

In addition to the above, Drayton also believes buyers should consider additional functionality and features that could be better suited to their specific situations. In Paxton’s case, “Our product range covers wireless and wired IP access control, including IP video intercoms, so clients can have a fully integrated access control solution from a single vendor, without any licence fees (Paxton has removed all licence fees from its product offerings for life). Our system and software are widely recognised as the simplest to install, commission and operate, and come with a hassle-free five-year swop out warranty.”

Similarly, the ability for access systems to integrate with other brands as well as other security systems (and even IoT systems), is as important. Paxton has recently noted an increase in requests for integration between biometric readers from one brand and the access control backbone from another.

Drayton adds that it is useful for surveillance and access control to work in harmony, enabling alarms and alerts from access control to be matched to the visual evidence. “Intelligent buildings are, without question, the future of our industry where all building services work in harmony, with little interaction from the user. This can be achieved in many ways that provide different benefits to the user, so it’s important that consumers have a clear idea on what they want from their system to get the most from it.”

This extends to selecting a system and provider that can adapt with the user as needs change. Users should look to work with companies that are investing in technology and bringing it to market, providing confidence that whatever type of access control is required can be catered for.

Managing your identities

Arguably, the most important part of an access solution is the database that contains the people and permissions assigned to them in terms of where and what they can access. The process to follow in setting up and maintaining this database differs when smaller companies are compared to large enterprises, however, the key is to have a single, accurate and reliable source of access and identity information.

“Access control systems, like most other technology, are only as good as the quality of information they contain,” notes Drayton. “A company’s HR database is quite straightforward to integrate into an access control system in order to add/delete users and administer privileges. In smaller organisations, it is common to have the access control database as a standalone hub of information. This is where software simplicity is critical, removing barriers to administrators, keeping all user data up to date to minimise risk.

“Paxton Access is a manufacturer of IP access control and video door intercom systems,” states Drayton. “Unique to South Africa, we have a no licence fee approach to our software for the life of the installation. Paxton trains more than 500 people each year in South Africa, free of charge, to specify, install and commission our systems. This ensures installers have all the tools needed to provide excellent service and solutions to the end user. We also have free phone after sales support service backed up by our hassle free, five-year, swap out warranty for all products.”



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

The future of security: intelligent automation
Access Control & Identity Management AI & Data Analytics IoT & Automation
As the security landscape evolves, businesses are no longer looking for stand-alone solutions, they want connected, intelligent systems that automate, streamline, and protect.

Read more...
Smart automation is changing security
SA Technologies IntelliGuard Access Control & Identity Management
Security has come a long way from manual check-ins, logbooks, and standalone surveillance cameras. With the rise of intelligent automation, security is now faster, smarter, and more connected than ever.

Read more...
The future of security in South Africa
ATG Digital Access Control & Identity Management
Security technology is evolving rapidly, but is local innovation keeping pace? Some global players recognise the potential of South African products for international markets, but can our manufacturers and service providers thrive without external support?

Read more...
Integration enhances estate access control
Access Control & Identity Management
With one-third of residential burglaries starting at the front door, the continued seamless integration of Glovent’s estate management platform with Impro access control software is welcome news for estates.

Read more...
T&A in South Africa’s retail sector
ERS Biometrics Access Control & Identity Management
Using existing systems, ERSBio provides a practical and more cost-effective way for businesses to manage operations, reduce payroll mistakes, and enhance overall efficiency through innovative T&A processes.

Read more...
Navigating the complexities of privileged access management
Editor's Choice Access Control & Identity Management
Privileged Access Management and Identity Access Management are critical pillars of modern cybersecurity, designed to secure access to sensitive resources, enforce principles like least privilege, and implement just-in-time access controls.

Read more...
Paxton opens second experience centre
Paxton News & Events Access Control & Identity Management
Security technology manufacturer, Paxton, has opened a new experience centre in Cape Town on 12 February in partnership with its exclusive distributors, Reditron and Regal Security.

Read more...
DoorBell with built-in AI
Ajax Systems Access Control & Identity Management Products & Solutions Smart Home Automation
Ajax Systems has announced the release of Ajax DoorBell, which features built-in AI, an IR sensor, and app control, seamlessly integrating into the Ajax ecosystem to ensure efficiency and security confidence.

Read more...
Physical security evolving beyond security teams
ATG Digital Access Control & Identity Management
The landscape of physical security is undergoing a major shift. Traditionally, selecting access control and visitor management solutions fell squarely on the shoulders of security professionals, but today includes legal, IT, technical operations and more.

Read more...
A passwordless future?
Access Control & Identity Management
The digital landscape is evolving rapidly, and with it comes the urgent need for more secure authentication methods. Passwords, once the cornerstone of online security, are now easy targets for cybercriminals.

Read more...