IP’s access control capture

Access & Identity Management Handbook 2017 Access Control & Identity Management, Integrated Solutions, Infrastructure

Unlike the surveillance market, the access control sector of the security industry is not known for constant innovation – not that it has been resting on its laurels. Perhaps this is because the concept of controlling access to a building or campus has always been a fairly standard process. Over the past couple of years, however, the industry has followed the surveillance market in making the move to IP-based access control, but without the fanfare we hear from the CCTV world.

The move to IP could be seen as a natural evolution, or perhaps the requirement to more easily integrate access with other security as well as building management systems. The integration of access control and video surveillance is a popular example of this. With everything running on the same network, management becomes simpler and the skills required for maintenance and repairs are also consolidated. And, of course, the ability to host your access solution in the cloud is also simpler. Of course, this is not completely dependent on simply adopting IP as your base infrastructure, but it helps.

In a ‘pure’ IP access controlled solution, the idea is that more functionality is also to be found in the reader/controller, once again expanding the scope of the access control system beyond simply allowing someone through a door or not. While it is fairly clear today that IP is the future of access control, Hi-Tech Security Solutions asked a number of people active in the industry locally for their take on how the African market is moving (or not) to IP. Are we about to see a mass migration or a more conservative approach?

Consolidation or not

Dan Drayton, Paxton’s country manager for South Africa believes the launch of global companies such as Paxton into the South African market in recent years has helped drive the change to IP, making some of the domestic brands move quickly to bring their own IP solutions to market.

Dan Drayton.
Dan Drayton.

Moreover, he says, “the recent acquisition of Impro shows this is the beginning, not the end, of consolidation in our market as the global players look to acquire new technology or buy market share.”

Brian Wynberger, national technical manager at Reditron, adds, “the move to IP can be attributed to a few reasons: the utilising of existing cabling infrastructure makes sense economically, eases installation and enable easier integration of security systems.”

Brian Wynberger.
Brian Wynberger.

Taking a somewhat more philosophical approach, John Loudon, brand manager for access control and fire at PinnSec, notes that all access control systems (ACS) have always incorporated an element of IP in them, even if it just a basic server/client environment. “Most of the popular ACS in Africa provide IP connectivity between all their components and promote this IP option as the preferred configuration. I do not think any one company dominates the move to IP, but I enjoy the perceived competitiveness IP has brought the ACS industry.”

He is of the opinion that the move to IP is being driven by current entrenched players that can offer the best of both worlds (IP and otherwise). Newcomer solutions seem to offer IP only and the African market may still have some trust issues regarding redundancy when it comes to relying on an exclusively IP solution. “People like and trust what they know and IP networks in Africa contend with a set of issues not commonly experienced in First World environments. I would imagine this could be an issue for newcomers with an IP only system.”

However, he does add that Africa is starting to trust IP reliability, understand the ease of implementation and although IP equipment is slightly more expensive, it is a lot less costly on the labour and implementation side. Loudon does not expect IP to be a big integration driver; however, expecting integration and multi-faceted solutions will eventually dominate the environment because that is what customers demand. “We believe in the very long term a building or security system will be judged on the solution it offers for the price: How much bang for your buck from a single source.”

Benefits of IP

If users are to migrate to IP, they first need to understand the benefits they can obtain and why the move is worth the effort. Too many companies have been taken in by the promises of new technology, only to find they fail to deliver when it counts, or that simplicity or other benefits expected are not realised.

IP technology enables the integration of an existing security system, which might consist of CCTV, access control and intruder alarm into a single user interface platform, says Drayton. “However, the proprietary cabling and protocols for legacy systems makes this almost impossible or at the least hugely complex and expensive. Today, there are many integration options for installers to use. For example, all Paxton integrations are available free of charge, while most of the market still charges, further delaying their adoption.”

Echoing these sentiments, Wynberger says having your security system of CCTV, access control, fire and intruder operating in an integrated solution is undeniably useful, and “this is what IP technology has enabled”. For example, he says Reditron can now supply customers with a fully integrated Avigilon, Paxton, and ViRDI system working as a single seamless solution.

As access control does not consume bandwidth like a CCTV implementation does, it is simpler to implement access control on the same network as the e-mail, Internet and business systems. Loudon says this also means the user’s IT department can take ownership, provide first line support and have total control. “Sometimes the challenge is getting these IT departments to accept responsibility and ownership for yet another business process. In my opinion, it is a major benefit for an installer/integrator to pass the database and networking infrastructure maintenance to the client’s IT department. The installers can then concentrate on what they are good at, installing security solutions.”

An IP installation is much simpler than traditional infrastructure, he explains, as the rules are the same for any IP system. In the past, many access control systems used the RS-485 communication infrastructure and had their own preferred tweaks to the rules of RS-485 to enable optimal communication performance for their specific system. Not only did this hinder the integration process, but also the interoperability of different brands.

Integration delivers value

It is a common refrain that IP allows for systems to be more easily integrated and managed. Drayton explains that each of the disciplines in the security industry has a clear value proposition, be that recording events and the analytic potential of CCTV, prevention of unauthorised access with access control, or multi-layered intrusion detection. “It is undeniably useful for these systems to operate seamlessly in a single user interface where the event in one system triggers an event, an alarm or an action in another.”

This can be achieved at very low cost with a Hikvision or Dahua/Paxton integrated solution for example, or in a much more feature-rich way when you explore the possibilities of integration with a VMS solution from a brand like Avigilon, NUUO or Milestone. As we bring in further functionality, such as T&A (time and attendance), customers can start to build a system that really works for them rather than finding them complex and not fit for purpose.

Wynberger adds that education is critical, but professional security installers and integrators are actually very well educated on IP through widely available training programmes and their desire to add greater value to end customers. Drayton supports this saying Paxton’s nationwide free training is helping installers and integrators to better use IP technology, showing them all they need to know to install, setup and maintain a Net2 system for the benefit of their customers.”

While the idea of integration is the buzz in the market at the moment, IP conformity, like using HTML for a website, has allowed for integration between different disciplines to be easier than ever before, agrees Loudon. He believes a reliable system that combines multiple disciplines (access control, people and time management, CCTV, PA, EVAC, intrusion and basic IO BMS) and that is affordable will eventually dominate the small to medium market sector. In addition, he says, “As legislation starts to dominate and influence even the smaller companies’ way of doing business, a cost-effective solution that satisfies legal requirements on a multi-discipline level will dominate. Some manufacturers are already moving in this direction.”

Digital convergence?

As access moves to IP, the potential for further value add is there in integrating all physical access functions with logical access. With one’s credentials stored in an enterprise directory, for example, logical and physical access can be controlled from a central point.

Loudon says one would expect these traditionally independent access functions to be merged, but this is generally not the case. There have been converged physical/logical solutions on the market for some time, but the uptake has not been dramatic.

“I only know of one site in South Africa that will not allow you to log into your computer unless you have first clocked on at the reception T&A clocking point,” Loudon says. “However, most of the time this is an impractical function as many of us like to work from home occasionally. With respect to time management, there are several sites where the payroll influences the time and attendance, which in turn influences the access control system. Therefore, for example, when you put in leave on the self-help payroll system, you will automatically be denied access onto site by the ACS. Should you be black-listed on the payroll, you will be arrested when trying to gain access on-site. Maybe the South African universities should adopt this functionality.”

Yet, while integrating access silos may seem like a good idea, using IP as your basic infrastructure also raises the question of cyber attacks, or hacking.

“We have to accept that having an inter-connected system with common protocols on a single network does expose our security system to the potential for cyber attack,” says Wynberger. “However, manufacturers all have their own encryptions for managing their hardware and software so that customers can feel secure.”

Drayton adds that one cannot rule out the possibility of being attacked, but the greater threat to a building’s integrity is the quality of the system used. “Many buildings still utilise low-cost solutions, where the door control hardware is housed in the reader, which can make the system vulnerable to a security breach. We would always advocate a client to install a system built on a door control backbone, with readers attached to provide the highest quality solution.”

Loudon agrees, “Like all IP-based systems, your IP access control system is equally likely to be corrupted by cyber issues as your VoIP (voice over IP) or any other IP system. The important thing is the way these IP systems are managed.”

When considering the move to IP-based access control, there are many benefits to offer users. The conservative nature of the physical access control industry, however, will see the uptake of IP remaining steady, but slow. There will be continual growth of the number of IP systems installed over the next few years, partially because of the integration benefits IP delivers. The benefit of IP is that customers are not forced to go with major upgrades and can migrate when necessary and convenient, mixing and matching as they go and creating hybrid solutions. It is these hybrid solutions we will see dominating the market in future.

The key to moving to IP-based access control is control: your management of the system and its integrations will determine the success of the project in the long term. And, of course, refraining from opting for the cheapest product on the market that is offered with a full basket of promises but only delivers problems.

For more information:

Paxton: www.paxtonaccess.co.za

PinnSec: www.pinnsec.co.za

Reditron: www.reditron.co.za



Credit(s)






Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Threats, opportunities and the need for post-quantum cryptography
AI & Data Analytics Infrastructure
The opportunities offered by quantum computing are equalled by the threats this advanced computer science introduces. The evolution of quantum computing jeopardises the security of any data available in the digital space.

Read more...
Unlock data insights and integration
Gallagher Access Control & Identity Management Products & Solutions
Gallagher Security announced the release of its security site management software, Command Centre v9.20, which enables integration with Microsoft Entra ID, a cloud-based identity and access management system that provides seamless synchronisation of cardholders across systems.

Read more...
Gallagher Security opens Cape Town office
Gallagher News & Events Access Control & Identity Management
Acknowledging a significant period of growth for the company in South Africa, opening a second office will enable Gallagher to increase its presence across the region with staff based in Johannesburg and Cape Town.

Read more...
Axis introduces ACS Edge and cloud storage
Axis Communications SA Surveillance Infrastructure Products & Solutions
Axis Communications has launched two new solutions within the AXIS Camera Station ecosystem, AXIS Camera Station Edge (ACS Edge) and AXIS Camera Station Cloud Storage (ACS Cloud Storage).

Read more...
Securing access against unwanted visitors
Intelliguard Access Control & Identity Management Residential Estate (Industry) Products & Solutions
In today's residential estates and complexes, one of the biggest concerns is preventing unauthorised access, while ensuring a smooth and convenient experience for residents and approved visitors.

Read more...
Smart access for a safer community
neaMetrics Suprema Access Control & Identity Management Residential Estate (Industry) Products & Solutions
Suprema's BioEntry W3 integrates AI-powered facial authentication into a sleek design that prioritises security, privacy and user experience, and even allows users to store their facial templates on their mobiles instead of external devices.

Read more...
Effortless and secure visitor management
Secutel Technologies Access Control & Identity Management Residential Estate (Industry)
Secutel Ventures has introduced SecuVisit, an access control solution designed to simplify visitor management while enhancing security. With two innovative components onboard, SecuVisit ensures seamless visitor check-ins anytime, anywhere.

Read more...
Glovent’s SOS Suite triple protects estate residents
News & Events Access Control & Identity Management Residential Estate (Industry)
One hundred and fifty-three years since the world’s first panic button was introduced in New York City, Glovent offers estate residents three different ways of summoning emergency assistance at the touch of a button.

Read more...
Security professionals gather at Integrate 360
Gallagher Access Control & Identity Management News & Events
Gallagher Security’s Integrate 360 brought together some of the best minds in security, innovation, and technology for two days full of insights, demonstrations, and future-focused discussions.

Read more...
Suprema showcases enterprise security at Integrate 360
Suprema News & Events Access Control & Identity Management
Since 2006, neaMetrics, Suprema’s distributor in Africa, has worked closely with Gallagher, building a robust partnership resulting in seamless integration between Suprema’s advanced biometric readers and Gallagher’s security management platform.

Read more...