Access Control

Electronic access control serves the purpose of limiting access of people or objects in defined areas through the use of credentials and electronic hardware. In the most simplistic form access control is a key to a locked door. With the boom in technology and integrated systems the options of access control are virtually unlimited. 

  • Track high-value assets around manufacturing plants
  • Manage building access remotely
  • Use a smartphone as a key
  • Employee time & attendance
  • Single source company identification card 
  • Track and muster employees and contractors

What is Access Control?

Electronic access control is a means of using technology to allow people and objects to move from different areas within a compound, building, plant, or facility. It aims to reduce the amount of keys in circulation, increase security, track people and objects, and perform automated tasks that otherwise would require human intervention.

The most common use of access control is to manage physical access into offices, facilities, and the areas within. This is accomplished by mechanical measures or electronic methods such as issuing a credential to a user and utilizing electronic components on the doors or gates controlling the area.

 

Biometric Access Control

Who Uses Access Control?

Access Control Card Reader
Electronic access control is widely used in commercial and Government buildings. Some examples are hotels, airports, military installations, HOA, manufacturing plants, and storage centers. Using electronic access control makes managing access into areas and buildings much simpler as it can be  managed remotely by a computer or mobile phone. The automation allows employees to focus more on their duties and less on issuing keys and ensuring those keys make it back. Losing a key may seem insignificant but can become a very expensive liability. Once a key is lost the locks controlled by the key become compromised until all locks are rekeyed or replaced. However, one simple deployment of electronic access control can eliminate this liability and improve business workflows. 

Cloud Benefits

  • No extra burden to the IT Department
  • No costly server to maintain onsite
  • Reduced up front investment
  • Quicker ROI
  • Free Software Updates
  • Pay only for what you need
  • No annual license fees
  • Manage from anywhere!

Cloud Access Control

A cloud based access control system has many benefits over a typical on premise system. Some of these benefits are quicker deployments, very simple to manage, no annual licensing, and lastly, always up-to-date. Investing in access control always comes with unprepared expenses that are alleviated with cloud-based systems. One example is the maintenance and software upgrades needed to host an on-premise access control system. The software upgrades, operating system upgrades, and general maintenance is often overlooked and becomes a burden to the IT Department. When deploying to the cloud it is managed behind the scenes which allows your team to continue growing and supporting the business. 

For more valuable information check out Brivo .

How Does Electronic Access Control Work?

In general, access control systems are comprised of a few major components to make a complete system such as: a server, client computer, a controller, credentials, and the field devices. A client computer is used to setup, configure, and manage the server or the system. A  controller, the brains or “the box”, is connected to a network, ultimately to the server, and to the field devices at the doors or gates to be controlled. Most commonly the field devices consist of electronic locks, card credential readers, door sensors, and motion sensors. The field devices are either activated or deactivated based on the parameters configured on the server.

For example, a credential can be assigned to unlock any door at anytime. When the credential is presented to the reader the lock will activate and allow entry. On the contrary, a different credential can be limited to only unlocking specific doors during business hours. In a more involved system credentials can be used to to not only unlock doors but used for other purposes either within the access control system or within the business. Credentials can be used for time and attendance, equipment vending machines, controlling lights and machinery, or whatever the imagination brings.

What About Credentials

Think of credentials as a replacement to the ancient key. Credentials are what validates us and gives authority to perform tasks as defined by the access control system. Credentials for the longest time were limited to a PVC card. Now they come in many shapes and sizes and formats. Mobile credentialing is becoming one of the most popular types as they can’t be lost, reside in a pool to reissue, and are easily managed. Other types include silicon bracelets, PVC cards, biometrics, and window stickers. Credentialing each employee and visitor  can be the most time consuming task of administering an access control system. Save time and money by using mobile phone or biometric credentials. Smartphones are in the hands of nearly every person in the world. With mobile credentials the phone becomes the key to the lock. When the credential is no longer needed it will return to the “pool” for reissue. Unlike traditional PVC credentials, mobile credentials cannot be lost which is an immediate return on investment.  Biometric credentials use the human anatomy, such as a fingerprint, palm, face, or retina as a form of identity. While parts of the human body may become damaged alternative methods such as a secondary fingerprint or pin code can be used.