A revolution in access control

Access & Identity Management Handbook 2009 Access Control & Identity Management

Access control has come a long way and been through many changes. Jack Edery, CEO of Elvey Security Technologies, believes it is about to undergo even more dramatic changes, all for the benefit of users.

Jack Edery
Jack Edery

Centuries ago, people’s access and egress to properties was probably controlled with large stones placed at cave entrances. Then guards, walls and moats succeeded this most basic form of access control. The process became mechanised with the use of wooden bolts and keys, thought to trace back thousands of years to the early Egyptians.

Over the years, as the need to protect family and property intensified, wood was replaced with metal, security locks took over from tumbler locks, and then came various versions of combination locks and time-locking mechanisms. The arrival of the computer and then the Internet changed the face of access control forever.

“With this new technology, systems could easily be reconfigured and access tag and cards were far more cheaply replaced than bunches of keys. There was also no denying the convenience of having only one tag to access multiple entry points within a building,” says Jack Edery, CEO of Elvey Security Technologies. “On top of that, access control systems could now provide records of all exits and entries, and data could be extracted from an electronic access control system into a payroll system.”

Used with growing confidence and success around the world, people could have been forgiven for thinking that analogue technology was here to stay, says Edery, highlighting its reliability and affordability. Yet he has little doubt that the future of access control lies in IP-based video surveillance. “If we look at the development of CCTV equipment, where analogue is fast being supplemented or replaced with IP (Internet Protocol), I have no doubt that access control is following the same trend,” he asserts.

Advantages

IP technology started making its presence felt in the access control market in 2007 and its popularity is soaring on the back of its many advantages. These include easy and cost-effective central database interrogation via local and wide area networks as well as easy and cost-effective integration with other systems. It also requires less cabling, which has huge cost-saving implications for installations in new buildings, owing to the type and amount of cabling required.

Highly adaptable, IP also becomes a reliable, functional hybrid when combined with access control and other applications such as building management, CCTV and time-and-attendance systems, for which Edery says there is growing demand.

Other factors that Zane Greeff; Elvey’s technical director sees driving IP technology into more businesses around the world are its cost-saving potential on the larger sites, user-friendliness and infrastructure simplification.

Zane Greef
Zane Greef

”Today’s electronic access control systems face a number of challenges. For one, sites are getting bigger, hence the need for more users on a system. This increases product, implementation and installation costs as well as makes the overall system more complicated to operate,” he says. “This is particularly true of installations that would have required every foot to be wired with copper.”

Another major departure from the traditional electronic access control system is that the IP-based or digital access control system is Web-based. Says Greeff, “In many instances, programming, viewing of data and reports can be done on the network using standard Web browsers.”

For all the new technology’s advantages, however, he warns that its benefits are directly linked to the following:

* The reliability of the company network.

* The overall security of the company network against unauthorised access and hackers.

* Power supply, whether traditional or PoE (Power over Ethernet) – especially in the event of power-cut or load shedding.

* The choice of system designer and installer, which both need to have adequate knowledge of security and network environments using TCP/IP.

“That IP access control is readily available is a given,” Greeff says. “The challenge is to balance the cost aspect of it. IP readers, which links directly to the company network, and are expensive since each unit has its own network port and electronic components.”

Accordingly, his advice to those wanting the best combination of cost-efficiency and efficacy is to use a networkable (TCP/IP ready) multidoor controller. He sketches the following picture: “Think of the controller as the computer controlling the access. Then picture a group of doors and readers connected to it with traditional or RS485 connection. The controller (and there can be more than one) in turn, connects through the network to the mainframe computer or server in the control room.”

Another key advantage of using IP as a transmission medium is that the cabling typically already exists in most businesses and residential markets today, says Michael Brett, Elvey’s national sales manager. “If it does not, installing Ethernet cabling is not expensive. Furthermore, computer networks allow users to make use of standard PC servers for video management and storage; PCs for controlling the security and access control systems, which ultimately makes the systems easier to use and understand. It is generally easier to work your way through a software programme than it is working with a user manual.”

Michael Brett
Michael Brett

The solution

According to Elvey integration specialist Francois Smuts, the way to ensure better convergence and integration between CCTV and access control security systems sharing the same TCP/IP network is to implement a number of small dedicated sub-systems that are linked via the company’s existing network. As these systems make use of existing company network infrastructures, the end results with regard to implementation, cost, complexity of design and installation time, are all improved. On sites that are more complex though, he recommends the installation of a separate network to counter possible problems surrounding the integrity and load pressure on the existing network.

This has proved to be a welcome solution for high-risk operations that have multiple sites or branches around the country.

“By connecting the various branches’ access control systems to the company’s existing network, the security manager is able to manage all access from one central point. Because he only requires a handful of operators to administer the entire system (as opposed to having one operation in each site), the risk of confidential information falling into the hands of the wrong people is greatly reduced. What’s more, head office is able to control non-employees’ access privileges to the various sites far more effectively.

“In the past, end-users would often complain about how complicated it was to use administration software, especially when it came with additional features and capabilities that manufacturers sometimes built in to justify the price. Although these features can be necessary in high-security environments, it was frequently a case of over-kill for the small to medium-size companies.”

Bigger is not better

Cutting-edge technology aside, users of access control systems are also buying into aesthetics. According to Smuts, people are paying more attention than ever to the appearance of their premises. “As a result, we are increasingly being called on to supply compact, non-intrusive access control and security systems,” he says. “The trend is definitely toward small, wireless devices which offer substantial cost savings owing to their ease of installation and limited cabling requirements.”

In summary, Brett says that the rise in costs today is forcing companies to reduce costs, which IP will do while enhancing security at all levels since network devices can be monitored individually for connectivity. The other major benefit of IP is the fact that one is able to deploy redundancy for transmission making use of secure wireless infrastructure as well as cellular infrastructure.

“And we are not the only ones who believe that IP is the future. Predictions by Rune Gustavsson of the American Department of Software Engineering and Computer Science (IPD) and Societies of Computation (SoC) estimated in 1997 that the number of PCs in the world was around 60 million, a figure he expected to rise to around 350 million by 2010. In support of this, according to him, was the number of devices that were network-equipped in 1997 amounted to around 10 million, which was likely to reach 3000 million by 2010.”



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Partnership addresses fire hazard mitigation
Brigit Fire (a Division of Hudaco Trading) Elvey Security Technologies Fire & Safety Security Services & Risk Management
Brigit Fire has partnered with the Elvey Group. The collaboration will see Brigit Fire distributing both the advanced C-TEC addressable fire detection systems (CAST Technology) and GreenMist lithium extinguishers.

Read more...
From wireless alarms to smart homes
Elvey Security Technologies Perimeter Security, Alarms & Intruder Detection Products & Solutions
The final brand SMART Security Solutions features in its discussions with companies operating in South and southern Africa’s detection and alerting technologies market is DSC, distributed in the region by Elvey Security Technologies.

Read more...
New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...
ControliD's iDFace receives ICASA certification
Impro Technologies News & Events Access Control & Identity Management
The introduction of Control iD's iDFace facial biometric reader, backed by mandatory ICASA certification, underscores the commitment to quality, compliance, and innovation.

Read more...
The future of workplace access
HID Global Access Control & Identity Management
Mobile credentials are considerably more secure than physical access control, because they eliminate the need for physical cards or badges, support multiple security protocols, and add layers of protection on top of basic card encryption.

Read more...
Integrated, mobile access control
SA Technologies Entry Pro Technews Publishing Access Control & Identity Management
SMART Security Solutions spoke to SA Technologies to learn more about what is happening in the estate access world and what the company offers the residential estate market.

Read more...
Bespoke access for prime office space
Paxton Access Control & Identity Management Residential Estate (Industry)
Nicol Corner is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. It is also the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption.

Read more...