The new age of access control

Access & Identity Management Handbook 2013 Access Control & Identity Management

Access control has become a vital component of any security concept worldwide. The protection of intellectual property rights, prevention of theft and sabotage or simply compliance requirements, there are a multitude of reasons why companies of all kinds need to use a comprehensive access control system to restrict, manage and control access to their facilities. However, operated in isolation from other safety and security systems, even the most sophisticated access control system cannot really live up to its promises.

In such an environment, operation and monitoring can quickly turn into a nightmare, as each system has its own architecture, its own user interface and its own management tool. This is why more and more organisations are looking out for an access control solution that easily integrates with video monitoring, intrusion detection and sometimes even visitor management to form a homogeneous security system with a consistent user interface and central management and operations.

Long gone are the days (or at least they should be), when a gatekeeper made a digital yes/no decision whenever somebody required access to a company’s premises. Today, companies need to manage access on a completely different basis. They need to define clearly who may enter which parts of the campus or individual buildings and they must also ensure that access is only granted at times when it is needed. Further, suppliers are more and more often faced with requirements of their customers to supply a documentation of all access attempts, whether successful or not, to protect against industrial espionage.

To fulfil this requirement, not only employee access must be captured and recorded, but also the entire visitor traffic. In some industries there are also compliance issues enforcing integration of visitor management – for example in the European food industry for certification against IFS-5. In addition to basic visitor management, it may also be desirable to have forced guidance along certain routes, control of singling systems such as turnstiles and weight sensors, anti-passback features, guard tour modules and others.

Video integration for more safety

While modern access control systems allow an efficient management of access rights, they are rather powerless against abuse if operated on their own. If an employee or visitor passes on his card, the illegitimate recipient 'inherits' all his access permissions. Tailgating is another issue that standard access control systems do not address. In critical environments it is therefore mandatory to add a second layer of security by integrating access control with some kind of video surveillance. To prevent abuse, all access requests can then trigger one or more video cameras.

Who is really standing at this rarely used backdoor? Who is trying to gain access to the warehouse right now with a card which was reported as lost? In an integrated environment, operating personnel can answer these kinds of questions with just a mouse click, ensuring a more rapid reaction to such events.

Integrated systems can also provide alarm verification, instantly displaying live video images from nearby cameras when there is an alarm event at a door – such as when a person presents an unauthorised credential or when a door is forced open. With this capability, the operator does not even need to know which camera to select to investigate the event, as integrated systems can be configured to automatically display the appropriate video on the screen. This level of instant response can improve the overall performance of a customer’s security staff.

Security personnel do not need to go to the site of an event to look into an alarm. They can view video of the event from their workstations and positively identify the cause – only going to the alarm location when follow-up is necessary. This reduces the amount of time security personnel spend away from their workstations and better prepares them with an understanding of the situation when they do need to visit the location. Some access control systems do even offer the same functionality to verify alarms of an integrated intrusion detection system.

Forensics can also benefit from such integration if the video recordings are referenced in the access control system’s event log. Such a feature greatly facilitates identification, retrieval and playback of past events and alarms if necessary. Systems offering pre-and post-alarm recording options also enable the operator to see video from immediately before and after the alarm event to better judge the situation. However, often the settings of surveillance cameras are less than optimal for the specific event, and therefore it is desirable to have the ability to change these settings without operator intervention. This could allow an access event to prompt a PTZ camera to move into a pre-set position or cause a DVR to record at a higher frame rate to capture more details of the event.

Prompting higher-quality recordings ensures the video resolution is sufficient for thorough investigation of access events. Local recording or archiving of live images or video clips from integrated video storage devices is also possible with most systems, giving customers the ability to capture individual snapshots related to important events.

Open standards ease integration

Integrating access control, video monitoring, and intrusion detection can be rather easy when all components come from the same vendor and if this vendor also offers a management platform for all of them. However, this is rarely the case. In a lot of applications you will find individual systems from different vendors for each of these tasks. In this case integration can be a nightmare if the integrator has to develop interfaces between the individual systems and do a lot of programming. In today’s installations it is therefore mandatory to select and install systems based on open and accepted standards which can easily be integrated by means of a central building management system as an umbrella. Most current systems use proven IT technologies such as TCP/IP and OPC for communications with such a management system.

Integrated systems 'off the shelf' can greatly ease installation and configuration of the security solution. Logical integration eliminates the need for multiple software platform and interfaces, resulting in fewer complications and greater event-driven functionality as well as reduced installation time and costs. What is more, this kind of integration also promises more efficient operation and a clearly reduced need for training, but above all also a higher security level.

An open standards-based management system even makes sense in those cases where one vendor supplies everything, as it opens up the entire installation for future expansion.

User interface is key

However, these benefits do not necessarily come by default. While technical systems may be quite efficient, if users cannot properly operate them, they will not deliver to the promise. An integrated security system is a very complex apparatus, and if this complexity is not hidden from the user, the system will be highly prone to human error and malicious operation. Such systems do need very clear and intuitive user interfaces, avoiding information overload while offering all the information that is currently needed.

This is even more important when several components or dialogs are open, which will often be the case if you deal with access control, video surveillance and maybe intrusion detection from the same console.

Secure the security system

When planning an integrated system, functionality and ease of use are certainly the most important aspects. However, it is also worth to have a chat with the IT department, as for them such a system is another complex application that they need to support. And what is more, it is a mission-critical application. Security systems need to meet defined uptime requirements and, in the case of live video, also guaranteed bandwidth. In some cases, strict uptime requirements will enforce fault-tolerant and redundant configurations which the system must support. Being a critical application, the security system itself needs to be secured against unauthorised access by means of IT security technologies.

For more information contact Bosch Security Systems - South Africa & Sub-Sahara Africa, +27 (0)11 651 9838, [email protected], www.boschsecurity.co.za



Credit(s)




Share this article:
Share via emailShare via LinkedInPrint this page



Further reading:

Outperform aspirating smoke detectors
Bosch Building Technologies Products & Solutions
With enhanced AI algorithms for greater reliability and accuracy in distinguishing real fire situations, the Aviotec 8000i IR camera achieves, on average, three times faster detection times than current aspirating smoke detectors.

Read more...
New State of Physical Access Control Report from HID
HID Global Editor's Choice Access Control & Identity Management News & Events
HID released the 2024 State of Physical Access Control Report, identifying five key trends shaping access control's future and painting a picture of an industry that has been undergoing considerable transformation.

Read more...
Smart intercoms are transforming access control
Access Control & Identity Management Products & Solutions
Smart intercoms have emerged as a pivotal tool in modern access control. They provide a seamless and secure way to manage entry points without the need for traditional security guards to validate visitors before granting them access.

Read more...
Easy, secure access for student apartments
Paxton Access Control & Identity Management Surveillance
Enhancing Security and Convenience at Beau Vie II Student Accommodation, a student apartment block located at Banghoek Road, Stellenbosch, with Paxton's access control and video management solution

Read more...
Invixium acquires Triax Technologies
News & Events Access Control & Identity Management
Invixium has announced it has acquired Triax Technologies to expand its biometric solutions with AI-based RTLS (Real-Time Location Systems) offering for improved safety and productivity at industrial sites and critical infrastructure.

Read more...
ControliD's iDFace receives ICASA certification
Impro Technologies News & Events Access Control & Identity Management
The introduction of Control iD's iDFace facial biometric reader, backed by mandatory ICASA certification, underscores the commitment to quality, compliance, and innovation.

Read more...
The future of workplace access
HID Global Access Control & Identity Management
Mobile credentials are considerably more secure than physical access control, because they eliminate the need for physical cards or badges, support multiple security protocols, and add layers of protection on top of basic card encryption.

Read more...
Integrated, mobile access control
SA Technologies Entry Pro Technews Publishing Access Control & Identity Management
SMART Security Solutions spoke to SA Technologies to learn more about what is happening in the estate access world and what the company offers the residential estate market.

Read more...
Bespoke access for prime office space
Paxton Access Control & Identity Management Residential Estate (Industry)
Nicol Corner is home to a six-star fitness club, prime office space, and an award-winning rooftop restaurant. It is also the first building in South Africa to have its glass façade fully incorporate fritted glazing, saving 35% on energy consumption.

Read more...
Next-generation facial recognition access control system
Enkulu Technologies Products & Solutions Access Control & Identity Management Residential Estate (Industry)
With a modern and innovative design, iDFace is the ideal device for monitoring and controlling people entering and exiting a building using facial recognition technology, including liveness detection, for enhanced security.

Read more...