EXCLUSIVE: Making the most of modern access control technology

People near door - access control

Share this content

Facebook
Twitter
LinkedIn
Rob Druktenis, Program Manager, Access Control, Axis Communications delves into how remote access management, credentials and other modern technologies help to keep locations secure.

The ability to control who has access to certain locations is a foundational element of security. Locks and keys have been used for hundreds (or, depending on which historian you ask, thousands) of years. It would be tempting, then, to assume that access control technology hasn’t changed much over the years.

That assumption would be false. In reality, access control has changed dramatically over the past decade alone, integrating with modern video surveillance technology and incorporating technological advances like biometrics and mobile credentials. The result has been access control technology that is more adaptive to the specific needs of the organization and capable of integrating with other software systems to enable a more comprehensive approach to security. Understanding the capabilities of modern access control systems can help today’s businesses keep their locations more secure than ever.

Uniting security solutions under a single platform umbrella

First, let’s talk about integration. While access control systems provide significant value on their own, they work best in conjunction with technologies like video surveillance. That means it’s important to have a video management system (VMS) capable of unifying those solutions into a single dashboard. As security systems grow more complex and interconnected, user-friendliness becomes increasingly critical and a VMS capable of integrating a broad range of security solutions can dramatically improve the system’s ease-of-use.

This means choosing the right VMS is critical. Finding a system capable of integrating the specific products and solutions your business needs or is likely to need in the future is important, as is making sure that system can expand and scale alongside the business. This may seem like basic advice, but it’s hard to overstate how important the right VMS can be. It isn’t just about choosing the right provider to meet your current needs, but anticipating what your needs might be down the road.

Do you anticipate expanding or adding new locations? Are your security needs likely to change? It’s important to choose a VMS capable of integration, expansion and flexibility to avoid becoming locked into a product that no longer meets the needs of the business.

Integrating access control systems and camera systems alone can have far-reaching benefits, putting exciting new capabilities in the hands of security teams. The data logged by both the cameras and the access control system can be stored within the VMS, allowing security personnel to easily pull up and review footage in the event of a security incident.

If such an incident occurs, security teams can easily identify where, when and how the culprit entered the premises and track their movements. That information can be critical for security or law enforcement personnel if an intruder is detected in a school, healthcare facility or other sensitive location.

Integration also makes additional verification methods possible. When someone uses a credential at an access control door, video verification can be used to visually confirm that the card matches the person using it. Even if facial recognition technology is not used, that video can be helpful in an investigation following an incident. If the intruder used a valid card, whose card was it? If they were buzzed in by an employee, who made that decision?

In the past, this information might have been difficult to obtain, but a modern VMS that integrates access control and video surveillance under a single umbrella puts it at the fingertips of security teams.

Touchless and mobile access improves security and flexibility

Another important access control development has been the rise of touchless access. The invention of digital keycards was already a significant step up from traditional keys – unlike a physical key, for example, a lost or misplaced keycard can be disabled, preventing it from becoming a security threat.

Similarly, a temporary keycard can be issued to a building visitor and programmed to only allow access to certain areas for a short amount of time. This has made access control solutions much more flexible and customizable, giving the ability to grant, adjust and revoke access as dictated by security needs.

Today’s solutions can go one step further and the rise of mobile applications has put an unprecedented degree of control in the hands of security teams. Using an access control app (or an app tied into the VMS), security personnel can check the status of a system, including which doors are open or closed and which are locked or unlocked. They may even be able to remotely view a camera installed near an access control door to verify the identity of a would-be entrant and unlock the door for them – even if they are not physically present at the location.

This can also make granting guest access to facilities simpler. Rather than issuing a temporary proximity card, access can be granted in advance via an application. When the visitor arrives at the building, they can simply present their phone to the proximity reader or door intercom and be granted access to the appropriate locations. Like a proximity card, that access can be changed or revoked at any time, giving security teams flexibility. In addition to being convenient, the mobile application approach can help businesses keep costs down – physical cards aren’t free, after all.

Many organizations have also implemented additional security measures at their access control points in the form of multifactor authentication. Biometrics, in particular, have become increasingly common, with many organizations using technology like facial recognition to provide an additional form of identification.

While not all businesses are comfortable deploying facial recognition, other biometrics like iris scanners and contactless fingerprint readers can be utilized instead. Most of these solutions remain touchless – the visitor simply needs to look into a camera or wave their hand across a scanner. A physical card can be lost or a credential compromised – but your hand is your hand and you can’t hand it off to someone else (no pun intended).

Cloud-based and edge-based systems 

Like other security technologies, access control systems have benefited from rising cloud adoption. Today, organizations can turn to cloud providers for data storage, eliminating both the upfront and maintenance cost of servers in favor of a subscription storage fee. As door controllers have grown more advanced and processing speeds have increased, many of the functions that once had to be run on the server or cloud side can now be run at the network edge on the controller.

This isn’t to say that every organization is turning to the cloud. On-premises camera systems and access control doors require extensive cabling, all leading back to a single tech closet and a server. While this can be pricey, it also gives the organization greater, more direct control over its data storage and protection, which certain organizations prefer.

That said, the reduced hardware and cabling costs associated with edge-based systems have made it easier to deploy additional cameras or access control hardware. It is also more affordable to do so and organizations that could once afford to secure one door may now be able to secure five or six.

This is especially helpful for organizations with multiple locations to secure – after all, buying and maintaining a server for each separate location can be cost-prohibitive. With cloud and hybrid deployments, one or two access control doors at each location can be maintained using the same system. Analytics like facial recognition and people counting software can also be run via integrated cameras at the network edge, allowing organizations to generate valuable data and actionable insights from their security solutions.

This can make the “smart building” capabilities that many organizations have longed for a reality. Data gathered through access control points can tell the building how many people are inside and allow it to adjust the HVAC systems accordingly. When certain areas are deserted, the lights and temperature can be adjusted to both save on energy costs and reflect a greener, more sustainable vision.

Access control solutions are primarily used for security, but as they grow more advanced and integrate with additional systems, exciting new possibilities will continue to emerge.

Getting the most out of access control

Access control has come a long way from the days of the simple lock and key. Remote access management, flexible credentials, advanced analytics and other modern conveniences have helped security teams not just keep their locations more secure, but streamline operations as well.

Thanks to the flexibility of cloud and hybrid deployments, these capabilities are within reach for organizations of all sizes and within all industries. Access control is an essential aspect of any security deployment and today’s organizations should make sure they’re getting the most out of their solutions.

This article was originally published in the June edition of Security Journal Americas. To read your FREE digital edition, click here.