“Today’s technology offers so much more than access control”

“Today’s technology offers so much more than access control”

"Today’s technology offers so much more than access control"Arthur Agnew, Chief Technology Officer, Securitas

In the early days, access control was contrived to make the lock and key redundant. No more having to replace all lock cylinders and keys when a suited key was lost. The solution of card access as a replacement represented an ROI that could be realised in a relatively short period of time. If a card was lost, it could simply be deleted and pose no threat.

The hotel industry was the first to buy in to this new technology and their investment opened the door to a programme of fast-paced development. Eventually the market experienced on-line solutions using dispersed databases, multiple door controllers and distributed systems redundancy. Software seemed to go through version releases monthly, becoming ever-more sophisticated with its added features and benefits.

Access system owners could now define who went where and when with ease. This, in turn, meant that audits of movement could be produced and researched. Access control as a means of ‘monitoring and controlling entry and exit’ had come into its own.

In the early days, access cards presented a variety of technology evolutions from barium ferrite (magnetic spot encoding) cards, those littered with holes for reading by IR sensors, magnetic stripe, bar code and eventually the then ground-breaking weigand card.

Nowadays, the look and feel of access control and its architecture is very different – as are the features and benefits it offers. At its most fundamental, it remains primarily a tool for the controlling of entry and exit. However, it has evolved to be so much more than simply logging and reporting who goes where and when.

Today, access control is, for the most part, firmly entrenched within the IT environment.
At the cutting edge, readers and cards utilise sophisticated encryption algorithms for enhanced security. Cards have evolved from being dumb devices to ‘smart’ technologies. They are programmable and able to hold numerous types of encrypted credentials, making the card a multi-purpose device in its own right. As with all innovations, cards have had to outpace criminal activity and become ever more sophisticated – especially with the advent of the 21st Century phenomena of card cloning.

Increased distributed intelligence, and a capacity to employ redundancy to the level of every door, ensures there will never again be a compromise to site security following a failure anywhere on the systems architecture. Gone are the days when the head end or a multi- door controller fails and access controlled locations suddenly present a security risk.

Latest innovations have introduced touchscreen readers utilising apps similar in style to those used by phones and tablets. There are also readers that will accommodate near field communications (NFC) and it is even feasible to use the NFC feature of a mobile phone as an authorised credential for gaining access rather than owning an ID card.

There are portable hand-held readers allowing for temporary access locations or mustering stations too distant to cable. The use of common software platforms and the increased sharing of information and protocols across the industry have increased the level of cross pollination and systems integration.

Access control has become an essential contributor to a site’s health & safety regime. Not just for mustering purposes, but as a means of facilitating automated free egress in an evacuation or, conversely, causing a lock-in following a bio-hazard event. It also offers live displays of occupancy across a site or defined zones, prevents access to hazardous areas if certain pre-requisites are not answered correctly at the reader, lone worker prevention, lone worker management and card tracking etc.

Access control readers can even be configured to temporarily disable cameras on mobile phones, to book meeting rooms, to display details of the last user at a given door (even present that user’s ID photograph), broadcast messages to users individually or globally and be used for guard tours.

The access solution is configurable as a visitor management tool, can be linked to payroll, report time and attendance data and enable access rights to a user’s PC workstation – either via logical access or alternatively enable/disable individual network ports associated with the cardholder’s workstation as he or she enters or leaves the premises.

Enterprise access control solutions can accommodate many thousands of readers, millions of cardholders, communicate across continents and be hosted by single servers, multiple client workstations and accommodate dual redundancy and hot stand-by servers.

The advent of ‘cloud’ based technology releases the client from hosting a solution on site by creating a means for outsourced centralised database holding, administration and event management. This works particularly well in regard to ID card bureau services, alarm over watch and response measures. It is entirely feasible that in the future, the ever deepening convergence of technologies and its data managed under a single user interface will eventually see a full migration of access control hosting and management to a trusted third party.

In other words, access control and the protection of its data will evolve to become a fully managed service, the ownership and responsibility of which will remain entirely with the specialist service provider.

[su_button url=”https://www.securitynewsdesk.com/newspaper/” target=”blank” style=”flat” background=”#df2027″ color=”#ffffff” size=”10″ radius=”0″ icon=”icon: arrow-circle-right”]For more stories like this read the SecurityNewsDesk Newspaper[/su_button]

Georgina Turner image

Georgina Turner

Sales Manager

Read the Latest Issue

Follow us on X

Follow us on X

Click Here

Follow us on LinkedIn

Follow us on LinkedIn

Click Here

Advertise here

Reach decision makers and amplify your marketing

Advertise here

Click Here

Related News

Graphic displaying a lockdown solution

Netgenium debuts next gen display and touchscreen technologies

Power-over-Ethernet (PoE) solutions specialist Netgenium will be showcasing its new range of IP…

ICT® Launches New TSL Access Reader Series

Integrated Control Technology (ICT®), a leading manufacturer of intelligent access control and…
Image Provided by Paxton

Paxton Partners with Skills for Security

The security technology manufacturer Paxton is proud to announce a partnership with Skills for Security…
Image Provided by ICT

ICT and Ingram Micro sign distribution agreement MEA

Integrated Control Technology (ICT), award-winning global manufacturer of intelligent electronic access control and security solutions..
Image Provided by Toshiba

Toshiba launches new HDD Innovation Lab

Toshiba Electronics Europe GmbH (Toshiba) has inaugurated a new HDD Innovation Laboratory (HDD Innovation Lab) at its site in Düsseldorf..
Image Provided by Verkada

Verkada Doubles Down on the Channel with Strategic New Hire

Verkada, a leader in cloud-based physical security, today announced the appointment of Micah Deriso as Head of Global Channel…
Image Provided by IPSA

IPSA Appoint Frontline Hero as Ambassador

Abdullah, the courageous security officer praised for foiling a horrific knife attack at Leicester Square, has been appointed as…
Image Provided by Codelocks

New Surface Latch from Codelocks

Codelocks is expanding its Gate Solutions by Codelocks range with the introduction of the new Codelocks’ Surface Latch…
Image provided by Genetec

Nicholas Smith to Lead Genetec UK and Ireland Operations

Genetec, provider of enterprise physical security software, announced the appointment of Nicholas Smith as its new Regional Sales Director…

News Desk

View all the latest, product, project and people news

News Desk

Click Here

Technology News

Keep up-to-date with the latest product innovation

Technology News

Click Here

Industry Sectors

Discover technology in action in all applications

Industry Sectors

Click Here

Enter The Awards

Showcase personal or organisation excellence

Advertise With Us

Reach decision makers and amplify your marketing

Advertise With Us

Click Here
Scroll to Top