0% found this document useful (0 votes)
5 views

Ultimate Guide to Access Control 4.4

Ultimate Guide to Access Control 4.4

Uploaded by

pp236254
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

Ultimate Guide to Access Control 4.4

Ultimate Guide to Access Control 4.4

Uploaded by

pp236254
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 24

Guide

The ultimate guide to


access control systems
The basics of access control, key system components and what
to look for when choosing an access system for your business
The ultimate guide to access control
Access control systems are an important element of security systems to protect property,
people and resources. Door access control systems determine who is authorized to enter a
property or a restricted area within a property and provide various techniques to manage and
control access.
Access control security is used in many different types of buildings, including campuses, office
blocks, commercial buildings, multi-tenant apartment buildings, industrial complexes, condos,
gated communities, schools, colleges, airports, stadiums and government buildings.
This guide explores what access control is and why it’s important to security. You’ll also learn
about the benefits and use cases for access control, as well as access control policies and the
components of an access control system.

Access control definition


The role of access control security is to regulate who can enter a building or a space. Its aim is to minimize risk to a
business or organization.

To secure facilities, organizations deploy electronic access control systems that incorporate user credentials, access
control readers, auditing and reports to manage and track access to restricted locations. They may also deploy alarms and
lockdown capabilities to prevent unauthorized access or control operations in restricted areas.

Electronic access control has replaced traditional lock and key systems as a more secure and convenient method of
controlling access, overcoming the problems of lost or stolen keys, retooling locks and the inability to view access activity.

Another subset of access controls– information security– can include ways to limit who has access to computer systems
or networks. Also known as cybersecurity access control, these types of methods are used both on the premises and
in cloud-based platforms to help ensure data and information remain protected. When combined with physical security
methods, it’s often referred to as security convergence, a growing trend in the security industry.

2
Why access
control security
is important
In short, replacing traditional locks and keys with electronic
security and access control strengthens security. Traditional
locks have many drawbacks, including management
challenges, lack of audit trails and the fact that metal keys
are easily lost, stolen and copied.

Electronic credentials are more difficult to steal or copy, and


they require validation before an individual can gain access,
giving security teams greater control over site access.
Electronic access control systems can be programmed with
different levels of access for individual users and groups,
which enables security teams to impose the strongest
levels of security where they are needed most.

Flexibility and control are important because, compared to


single-family residential properties, commercial buildings
must provide convenient, secure access to large numbers
of occupants and their visitors, who might include friends
or family, business visitors, couriers delivering mail,
packages or food, contractors, or tradespeople carrying out
maintenance work.

A commercial access control system is important at


building entrances, where the system provides convenient
access for employees, residents or other occupants while
preventing intruders or unauthorized individuals from
entering.

Within a building, access security protects areas where


entry must be restricted to authorized users only. In an
office block, this might apply to server rooms or spaces
where confidential data is stored. In a multifamily residential
complex, the access security system might limit access to
resident-only facilities, such as gyms or mail rooms.

A door access control system also provides security teams


with important information on all entry activities. This
can provide useful evidence in the event of an incident or
suspicious activity.

3
How access control Access is granted or denied based on
the user’s security clearance level. This
security works category is used to protect highly secure
A user authorized to enter a building or secure areas.
area presents credentials to an access control • Attribute-based access control (ABAC):
reader positioned at the entrance or door. This approach provides access to users
The reader transmits the credentials’ data to based on who they are rather than what
software, validating the credentials against a they do. Access permissions can be based
database of authorized users. on the user’s type, location, department
and duties, mirroring the organizational
If the credentials are valid, the software
structure of the business.
initiates a door release signal, granting access.
If the credentials are invalid or the user does • Role-based access control (RBAC): Access
not have the necessary permissions, the door is based on defined business functions
will remain locked. rather than the individual user’s identity. The
aim is to provide users with access only to
Access control panels or controller boards are areas that are deemed necessary for their
the backbone of access control systems. They roles within the organization.
determine the basic functions of the system,
• Rule-based access control: An
including the entry decisions. The system also
administrator defines rules that govern
records and retains all access requests for
access to an area. These rules may be
analysis, audit or evidence.
based on conditions, such as time of day
In the case of visitors requesting security and location.
access, they will either need temporary
credentials, such as a visitor badge or digital
guest pass. If the occupant or front desk
has the ability to operate the access control
mechanism, either via a button or app, they
can issue a door release signal to grant
access.

What is an access
control policy?
To impose the right level of security and
access at entrances to restricted areas,
security professionals or property managers
must enforce access control policies. These
fall into five main categories:

• Discretionary access control (DAC): The


owner or administrator of the property sets
the access control policy defining who
is authorized to access the building or a
specific area. This type of access control
provides minimal levels of security.
• Mandatory access control (MAC): Security
professionals grant and manage access
rights based on multiple levels of security.

4
Authentication Authorization Access Manage Audit

Access control functions The data from door access control helps security
professionals monitor the performance of the systems
Access security has five main functions: through reports such as:
• Authorization: The access control system administrator • Door activity history recording who opened a specific
specifies individual users’ access rights to areas or door and at what time.
resources. For example, employees are authorized to
enter a building but only permitted to enter restricted • Invalid access attempts where users attempt to use
areas relevant to their grade or job function. their credentials at an unauthorized access point.

• Authentication: The system or an individual validates • Door openings, door forced open or door left open
an entry request, such as the identity of a person or the too long.
credentials they present. For example, a resident checks
a video image of a visitor before granting access or Access security configuration
the system validates credentials against a database of
System administrators use the information from the
authorized users.
authorization process to configure access levels for users
• Access: When the system has authenticated a request, and access locations. They rank locations based on the
it grants access by opening a locked door. level of security and authority required to gain access.
• Management: Security administrators manage the They can then configure the credentials issued to individual
access control database by adding or removing users.
authorized users so that the access control devices only
Access control software can also configure user credentials
validate requests based on current information.
to automatically expire by specific dates, like the completion
• Audit and review: Regular reviews and audits minimize of a project or the date when a resident leaves their tenancy.
the risk of users retaining access rights they no longer The software can also configure temporary credentials for a
require. Audits also provide essential records for one-time event, where attendees will only require access for
compliance. emergency maintenance or a vendor visit.
Reporting is also an important function. Each time a user
Building owners may wish to restrict general access to a
requests access, the system generates data that provides
building at certain times, such as evenings or weekends.
important management information. The system records
Software can configure all credentials to be invalid at those
all access requests with details of location, user identity
times. It’s also important to put emergency measures in
and type of credential used. Notifications also provide
place so that access control systems can automatically
insight into potential security issues, such as tailgating,
operate in lockdown mode in the event of a fire or other
doors left open or access requests from unidentified users.
emergency.

5
Security access locations
Security access control examples are found in many
internal and external areas of a building or campus that
need to be secured and controlled. Here are a few examples
of common areas for access control security to be installed:

• Main entrance: This might be a reception area where


check-in is automated, and employees and visitors must
present credentials. There may be multiple entrances to
a building, so it is essential that they are all covered by
access control techniques.
• Turnstiles: These might be located close to the main
entrance as a means of access control where there is
public lobby access but restricted access to the rest of
the building. They may also be located on other floors or
zones that need to be secured.
• Car lot or parking garage entrance: Entry may be
secured by a gate or other form of barrier that limits
access to authorized vehicles and visitors.
• Elevators: Access control systems may be used to
manage numbers of occupants or to control access to
certain floors.
• Server rooms: All entrances must be secured, allowing
only authorized users.
• Perimeter: In a building or campus with a large
perimeter, security access can be installed at gates,
barriers or other entrance points to manage the flow of
visitors and vehicles.
It’s also essential to identify other areas that are vulnerable
to intrusion, represent a security risk, or where it’s important
to manage movement:

• Vulnerable areas: These include emergency exits,


windows or unsecured exterior doors where intruders
could gain access without detection.
• Areas with a security risk: In commercial buildings,
these include certain offices, storage areas or meeting
rooms where confidential information is held. In multi-
occupant residential buildings, these might include
storage rooms or resident-only facilities such as gyms or
recreation areas.
• Areas to manage movement: These include lobbies,
stairways and passages where it’s essential to avoid
overcrowding.

6
Access control components
Door access control systems have a number of basic components, each with its own importance for
a fully functioning system. It’s important to understand how access control components influence
the convenience and security of the system in order to deploy a solution that fits your needs.

Door access control • Mobile solutions: Users download an app


to their smartphone or other mobile device.
credentials Depending on the access control system,
Credentials are what users will present they scan the smartphone at the reader
to a door reader when they want to enter or use an unlock feature in the app to gain
the building. There are six main types of access. Mobile credentials support regular
credentials that offer different levels of security use for authorized users or temporary
and convenience: access to specific areas for visitors,
contractors, or service staff.
• PIN codes: PIN codes are convenient but
• Biometric solutions: Biometric door locks
require users to remember their codes.
combine strong security with convenience
General codes can be used in low-risk
for authorized users. The most widely used
areas, with individual codes issued for
solutions include fingerprint door locks,
higher-security entrances.
facial ID and eye scan door locks for retinas
• Swipe cards: These badges feature codes or irises. Biometric solutions overcome
on a magnetic strip. Users swipe the cards the problems of lost or stolen credentials
through a reader to request access. While because they are extremely difficult to copy.
they are convenient, they can present a
The systems to capture biometric credentials
security risk if users swap or lose cards that
and the scanners required to read them are
can be used by intruders.
expensive, and this initially limited their use
• Proximity key cards and key fobs: to protecting highly secure areas. However, if
Proximity solutions use RFID technology to budgets allow, they can also be used as a fast,
provide contactless access. Users present convenient method of access in high-traffic
RFID-enabled key cards or key fobs when areas.
they are close to a reader. This makes them
a simple, convenient form of access for
high-traffic areas.
• Smart cards or smart fobs: These
advanced cards and fobs contain a
computer chip that can store additional,
unique credential information, increasing
security while retaining convenience.

7
Door readers • Smart door lock readers: These readers are
designed to operate with different types of
Door readers can be installed inside and credentials. They can also be programmed
outside of the building to provide security for two-factor authentication using a
for areas with different levels of vulnerability. combination of credentials to increase
There are different types of security door security levels.
readers for use with corresponding credentials.
They include: • Video door readers: Video door readers
have a camera embedded into the access
• Keypad readers: Users key in a general or control device, giving security teams visual
unique PIN using the keypad. Although this evidence of identity and any security issues.
type of reader is simple and convenient • Intercom readers: This type of access
to use, PINs can be shared, guessed or control device combines reader technology
used by intruders with stolen credentials, with two-way audio and is commonly used
especially when buttons wear over time. on front doors to help verify visitors prior to
Capacitive touch keypads and longer-digit granting entry.
unique PINs help combat these challenges.
• Key card swipe readers: Users swipe their Controllers and access
key cards through the reader. Although
these readers are secure, they may require control boards
frequent maintenance if they are used in These are the “brains” of the access control
areas of heavy traffic. system, linking the door reader and the user
• RFID key card or key fob readers: This type database. These units are usually installed
of contactless reader is more suitable for behind restricted doors, as they contain vital
heavy traffic areas. Readers simply present data and information that should be protected.
their credentials when they are within range
of the reader.
• Biometric readers: Users present one
of their approved biometric attributes,
which are scanned for validation against a
biometric database. For even higher levels
of security, biometric solutions can be used
as part of two-factor authentication with
other credentials.

8
Access control software
and data storage
The software for access control systems
is a vital tool for managing the database of
authorized users. The database holds the
details of the network of access-controlled
doors and authorized users together with their
access levels.

To maintain security, it’s essential to keep the


database up to date by adding new users and
removing users who have left or who no longer
have permission to access specific areas.

There are two options for hosting access


control software: on-site in servers or hosted in
the cloud.

Access control devices can produce high


volumes of data, particularly if the system
incorporates video or biometric credentials,
which create very large file sizes. If data
volumes grow, additional servers may be
required for an on-site system.

Cloud storage scales more easily, offering


additional capacity on demand with a higher
subscription. In some cases, a hybrid option
may be available, which is particularly useful
for businesses with multiple locations.

Another key differentiator in these system


options is that on-site servers have to be
maintained and updated by an internal IT team.
All maintenance and updating of cloud-based
systems is usually handled by the hosting
company as part of the subscription.

Cloud storage for access control devices


offers the additional benefit of remote access.
Security teams are no longer restricted to
reviewing data onsite. If data is stored in the
cloud, security teams can also access the data
from any location using an Internet-connected
fixed or mobile device. This increases flexibility,
allowing teams to remotely monitor and
operate keyless locking systems outside of
normal business hours.

9
Electronic locks for door Data networks and cabling
access control Dedicated cabling has traditionally been used to
connect security access components. However,
Electronic door entry systems remain closed
cabling can be expensive to install and
until a user’s credentials are validated and a
maintain, with additional installation costs if
“release” signal unlocks them. There are two
the system changes or expands. Data networks
types of electronic door locks for commercial
offer a more flexible alternative for IP-based
keyless entry:
systems. Access control components, such as
• Electric strike locks: These are fitted to the readers and control units, can be connected
inside of a door frame, where they replace to existing networks wirelessly or using Power
conventional lock strike plates. A small over Ethernet (PoE), reducing installation costs
motor on the strike is connected to a power and offering simpler, faster scalability.
supply, and the current holds the strike plate
A fast, secure and reliable data network is
in the locked position. When an access
essential for efficient access control operations.
controller submits a “release” signal, the
motor releases the strike plate, allowing an The networks must be able to transmit signals
securely between controllers, readers and
authorized user to open the door.
electronic locks. Data networks must be
• Magnetic strikes: These incorporate capable of transmitting high volumes of data
an electromagnet attached to the door at high speed to minimize the risk of slow
frame, which bonds to a metal plate on response times. To maintain performance, the
the door. The door remains locked while network should offer high bandwidth availability
an electric current is flowing through the and traffic prioritization to support data-
electromagnet. When credentials are intensive tasks, such as video or biometric
validated, the access controller sends a data transmission.
signal which cuts the power, breaking the
magnetic bond and allowing the user to
open the door. Power supply
An access control system requires power
Commercial security doors for door readers, controllers and electronic
door locks. Power can be connected using
Electronic locks for access control are generally
conventional cabling to each component
used in conjunction with commercial security
or supplied via a data network using PoE
doors, which have the strength and durability to
technology. This simplifies installation and
resist threats. These doors can cope with high
reduces costs because no separate cabling
traffic volumes and continuous use by larger
is required.
numbers of users with minimal maintenance.
They also have the performance to withstand Access control best practices recommend
different internal and external environmental backup power for each component to keep
conditions, such as extreme weather. doors functional during internet or power
outages.

10
Integrating door access control systems
with other security solutions
Access control systems provide an essential first line of defense against unauthorized access. However, integrating access
control devices with other security system components can strengthen protection even further and provide security
professionals with a single 360-degree view of activity throughout a building.

Security video cameras monitor vulnerable areas inside and outside commercial properties to identify and record incidents.
Installing video cameras in restricted areas allows security teams to watch and analyze feeds, enabling quick responses to
incidents.

Integrating security access data with video feeds enables security teams to identify suspects more easily in the event of an
incident.

Fitting alarms and sensors to external doors and windows extends security coverage and ensures security teams receive
immediate notifications of any attempt to break into the building. When integrated with the access control system, this
allows security teams to quickly identify a door forced or propped open or remotely unlock a door if needed. Smoke and fire
alarms can be integrated with security access to trigger local or building-wide lockdowns in the event of an emergency.

Software applications can also be integrated with access control systems for more efficient management. For example,
syncing identity platforms with access control ensures credential databases are always up to date and connecting visitor
management platforms gives security teams greater control and visibility over guest access within a property.

Video cameras, alarms, sensors, access control devices and electronic locking systems should be built to open standards to
integrate easily into a comprehensive security system.

11
Benefits of access control
systems
Investing in access control techniques can transform the security and
convenience of building access and deliver important operational and
financial benefits.

Stronger security
Replacing traditional locks and keys with electronic access control mechanisms strengthens
security. It eliminates the problem of lost or stolen keys and replaces them with electronic
credentials offering different levels of security. Electronic credentials are more difficult to copy,
and they require validation before a user can gain access, providing security teams with a greater
ability to control access.

Targeted security
Security professionals can deploy different types of door access control systems or program
electronic credentials with different levels of access. This enables security teams to impose the
strongest levels of security where they are needed most. For example, smart key cards can be
programmed with unique codes to protect highly secure areas, or users can be assigned mobile
access permissions based on their titles or work schedules. Mobile or RFID credentials can
also be paired with other credentials, such as PIN codes or biometrics, to support two-factor
authentication.

12
Greater convenience for users More flexible property management
Credentials for security access control systems are A cloud-connected security access system gives teams
available in different forms, all offering users convenient greater operational flexibility. They no longer have to be
access. Proximity solutions, for example, allow users to onsite outside normal business hours because they can
enter high-traffic areas quickly and easily, while biometric manage access requests, open or lock doors and monitor
solutions eliminate the need for separate credentials. alerts from any location with a secure internet connection.
Mobile credentials can increase convenience even further
by allowing users and visitors to identify themselves using a A remote door entry system can provide important security
smartphone app. When choosing and developing an access continuity in the event of a fire or other disaster that makes
control policy, make sure to provide staff training on how to it impossible to provide onsite security management.
use the new system. Teams can continue to monitor and secure doors from a
temporary location with internet connectivity.

Simpler user management


Security teams no longer have to issue, manage and Reduced support burden
replace large numbers of individual keys, which could prove Electronic access security systems require less
expensive in a building with many different lockable doors maintenance than traditional manual entry systems. IT
and entrances. Adopting mobile credentials simplifies staff do not have to manage and maintain connectivity and
management even further. Teams do not have to issue key power supply because this is handled by the network team.
cards or key fobs; they simply send a link to smartphone If the system is cloud-enabled, the IT team doesn’t have
apps with individual access levels. to manage servers or other infrastructure because this is
handled by the cloud hosting provider.
Modern access control system management software
also allows teams to manage credentials online, handling
moves, additions, changes and removals with just a few
clicks. With cloud-based access control, security teams can
manage user credentials from any location on any internet-
connected device.

13
Greater scalability
Networked access control security systems are easier to scale than
conventional lock and key systems or access systems connected by
dedicated cabling. A new door reader can be added to an existing data
network with no need for delay or disruption when installing dedicated
cabling. In addition, adding new locations to the access control security
network in the cloud is just as effortless, with all sites managed from a
single dashboard.

Consistent security levels


Cloud-enabled security access systems provide an opportunity to
centralize security operations and impose consistent security standards,
particularly for organizations with multiple sites. A central security team
can monitor and manage all access requests from a single location or
remotely via a secure web browser. Centralized management enables
security teams to standardize permissions and access levels across all
sites, which can strengthen overall security.

Detailed audit trails


Data from access control requests can be useful for analyzing real-time
access activity and providing input for security audits, management
reporting and compliance records. This type of information can also help
security teams and property managers assess the efficiency of access
control and refine best practices over time.

Streamlined interoperability
Access control devices designed and built to open standards can be
integrated with other security components such as sensors, alarms,
video security cameras, existing access control systems, and fire and
smoke alarms to create a comprehensive security solution that enables
security professionals to monitor and manage all activity through
a single pane of glass. These systems can also be integrated with
compatible building management systems and environmental control
platforms to improve overall protection and safety in the building.

14
Access control
and smart
buildings
Access control systems play an essential role
in protecting a building and its occupants
against threats from intruders, but they can
also make a wider contribution to building
management and the evolution of smart
buildings.

While the primary application of access control


techniques is to monitor and control access
to secured areas, data from the system can
also provide occupancy management insights.
That can provide valuable input into facilities
planning to create safer and more efficient
routing as well as optimizing space utilization.
For example, analyzing traffic in conference
rooms can provide useful information on room
availability and occupancy levels.

Access control devices can also be integrated


with other elements of building management
systems. For example, security access data on
room occupancy can support more efficient
use of heating, lighting, ventilation and other
facilities by automating the allocation of
resources in line with actual occupancy. This
can help improve resource efficiency and
reduce overall operating costs.

15
Selecting Management
In addition to adding convenience for

an access
employees and visitors, access control
mechanisms and systems should also
be convenient to manage. Operation,

control security configuration, management and maintenance


should be straightforward with software that’s

system
intuitive to use and interoperable with other
security tools. Selecting a cloud-enabled
system simplifies management even further.

There are many factors to take Customization


into consideration when selecting a System components should be customizable
security access control solution for so that security professionals can configure
door access control: them to meet specific requirements for
different areas and individual users. Look for
solutions that offer multiple permission levels,
Security door schedules and custom management
The most important factor for selecting an dashboards to further streamline and control
access control system is security. The system access throughout the property. The system
must ensure that only authorized users and should also be quick and easy to reconfigure if
approved visitors can enter a building. Door security requirements change.
access security must restrict entry and provide
adequate protection for areas of the building
that contain sensitive information or resources
and facilities that could harm the business if
they were damaged by intruders.

Reliability
If a reader or access control unit is not reliable,
it reduces the level of security. Downtime for
repair or maintenance also increases risk
and inconvenience for users. The equipment
should have guaranteed levels of uptime and
incorporate backup or failover solutions for
high-security areas.

Convenience
Although access control is designed to deter
unwanted intruders, it should not prove
inconvenient for authorized users who require
access. The system and access control
devices should be quick and easy to use and
incorporate touchless technologies for added
convenience.

16
Scalability
For growing businesses, it’s important to have a system that can be
easily scaled to cover more access points or support additional users.
Organizations operating across multiple sites can improve operational
efficiency if a system on one site can be scaled via the cloud to other
sites. This will ensure consistent security across the organization and
reduce overall costs.

Compliance
The security access control system should enable the business to
comply with any customer security requirements, data protection
requirements, or industry-specific regulations. For example, customers
may require data relating to their business to be secured by special
measures as part of a contract. In some industries, compliance with an
international security standard such as ISO 27001 is essential for doing
business, while businesses in sectors such as healthcare or financial
services require even higher levels of security compliance. In general,
it’s essential to provide security for personal data to comply with data
protection regulations.

Cost of ownership
Cost is one of the most important factors in selecting an access control
system, not just the initial costs, but the ongoing costs for operating,
maintaining and managing access control systems. The upfront cost
will be based on the number of access points to be covered and the type
of components required. The ongoing costs will include installation and
configuration, operation, monitoring and management and the costs of
maintenance, repair and upgrading. Costs may be more predictable with
a cloud-based solution that includes maintenance and upgrading costs
in a monthly subscription.

Access control features


In addition to securing your entrances, access control systems should
also help improve operational efficiency, saving time and resources. For
example, automated notifications from the cloud ensure the security
team has the latest information on potential incidents. A wide range of
reports will enable security teams to provide different stakeholders with
the specific information they need for their role. Remote management
capability improves convenience and flexibility for the IT team, enabling
them to manage systems and respond to incidents from any location.

17
Getting the best
downtime reports so you can compare. Also, consider
adding backup and fail-over security for your access-
controlled doors.

access control Is the system on-premise or cloud-based?

system for your


It’s important to weigh the pros and cons of a cloud-based
vs. on-premise access control system before investing in
new technology. If you have an on-prem solution, some

building providers now offer remote capabilities and hybrid cloud


deployments to make management more flexible.

To gain full benefit from security access control, it’s How easy is it for employees to use the access control
important to plan the solution carefully by assessing devices?
vulnerabilities and access requirements throughout the You don’t want to make it harder for your staff to get into
building. A professional security system installer can the building. Unlocking the door should be simple, fast
provide advice and guidance on the most appropriate and reliable. Touchless access control methods are a
solution for different areas of the building and prepare great way to keep traffic moving in your building without
detailed installation plans. Security specialists can also compromising on security.
recommend integration opportunities to ensure the system
forms part of a holistic solution for building security and What does the installation process look like?
management. Before purchasing, know how long your access control
system will take to install and what the installation project
Here are a few questions to ask when determining which
will involve. Do you need to run new cabling? Are there
access control features and solutions are the best for your
existing access control units or readers that you want to
business:
keep? Be sure to include installation costs in your access
control plan.
How reliable is the access control system?
Security systems are only worth the investment if they
work. Reliable door access control systems will have public

18
What access control features are available
with this system?
Be sure the system you invest in has a full
feature set, with everything you need to
maintain security in your buildings. Look for
customizable user permissions, the ability
to set door schedules, advanced reporting
and audit tools, support for multi-factor
authentication and automatic alerts. Other
features you may want include lockdown
capabilities, custom rule engines, digital guest
passes and unification with video security
systems.

Does the system integrate with my existing


security and access control infrastructure?
Open architecture is an important
consideration for access control, as it allows
you to connect your access control devices
to other security systems. For the best
experience managing and maintaining your
security, access control systems should be
able to seamlessly integrate across your entire
technology stack, including video systems,
alarms and software tools.

How future-proof is this access control


system?
A future-proof system is one that has all the
access control features you need now and will
also work for any future security challenges
the business might face. Factors like
scalability, ease of integration and automatic
updates all impact how future-proof a solution
is. Consider what the process is for upgrading
the software with the latest security, and
how the company rolls out new features to
determine the longevity of your access control
system.

19
Access control case studies
Find out how organizations use Avigilon’s access control solutions to
address their most pressing safety and security challenges.

Frictionless employee access Securing sites, staff and goods at


for Domino’s the Port of Guaymas
Facing challenges in managing secure access for To enhance security and meet regulatory requirements,
employees in a fast-paced, high-turnover environment, the Port of Guaymas implemented Avigilon Unity Access,
Domino’s turned to Avigilon Alta for a more efficient streamlining control over restricted areas across its
solution. Implementing hands-free mobile access and expansive site. This access control solution allows the
Avigilon Alta’s patented Triple Unlock technology allowed port to manage and secure entry points, helping prevent
employees to enter and exit with ease, even when carrying unauthorized access. The platform enables remote
food, improving both safety and efficiency. management, giving the security team greater flexibility and
control over access.
Avigilon Alta’s cloud-based platform integrates with a
directory service, simplifying access management for Avigilon’s video security supports the access control
supervisors, who can add or remove employee credentials solution by providing a way to visually verify identity at
remotely. This integration streamlines operations, allowing entry points and assist in incident investigations. Together,
managers to focus on daily business needs while ensuring Avigilon Unity Access and video security solutions create
a more seamless and secure experience for employees. a robust, unified solution that enhances security while
streamlining daily operations at the Port.
Read case study
Read case study

20
Enterprise-class security solutions for Rogers Public Schools ace safety
Stamps.com with Avigilon
Stamps.com, a global leader in online postage and shipping With over 60 buildings spread across a large district, Rogers
software, upgraded to Avigilon Alta’s cloud-based access Public Schools (RPS) needed a comprehensive solution
control system to simplify security management across its to address vandalism and theft instances. Additionally,
11 locations. By switching to mobile credentials, employees the school’s outdated security system had no remote
can now unlock doors using their smartphones, eliminating management capabilities, requiring extensive manual
the need for multiple key cards and improving convenience. checks from security operators.
Alta’s open API allowed Stamps.com to centralize its
security tools, automating processes and enhancing RPS implemented a unified Avigilon Unity suite, integrating
security. a mobile-enabled access control system and AI-powered
cameras for a comprehensive security system. Combining
The integration with Okta enabled seamless user access logs with real-time video footage allowed the team
management, simplifying the process of issuing or revoking to act swiftly and streamline security operations. This
credentials. The touchless Wave to Unlock feature has unified system has given RPS the flexibility to manage
been a favorite among employees and visitors, reflecting access remotely while providing a robust platform to
the company’s modern approach to work. Integration maintain a safe learning environment.
of Avigilon Alta Access with the building’s alarm system
helped minimize false alarms and created a more secure
Read case study
and efficient work environment.

Read case study

21
Avigilon access
control systems

Avigilon Unity Access Avigilon Alta Access


Avigilon Unity Access is a 100% browser-based, on-premise
access control solution. Whether you’re securing a single Avigilon Alta Access is an intuitive, cloud-based access
building or multiple sites, this user-friendly system can control solution that helps enhance security while reducing
be quickly deployed, empowering you to protect people, operational costs. From a single door to multi-site
property and assets – no software installations required. enterprises, Alta’s agile system helps improve security and
increase situational awareness, while simplifying access for
With flexible third-party integrations and open architecture, employees and visitors with hands-free mobile credentials.
Avigilon Unity Access is a future-proof solution that Designed with an open API architecture, Alta Access
unifies access control with other security systems for a integrates easily with your security platforms and tools.
comprehensive security ecosystem. Its Scenes feature The platform provides real-time visibility from anywhere via
delivers a dynamic approach to managing security objects, web or mobile apps, empowering teams to manage access
providing real-time insights and enabling you to respond and respond to security events remotely. An intelligent
to critical events quickly. The mobile-enabled platform rules engine provides teams with powerful alerting, alarms
streamlines daily operations, allowing you to manage and workflow management, notifying you of suspicious
security from anywhere. activities and enabling rapid response.

Learn more Learn more

22
Video Intercom Reader Pro Standard Smart Keypad Reader
The Video Intercom Reader Pro combines all front door The Standard Smart Keypad Reader combines the
security features into one intelligent device, offering live capabilities of Avigilon Smart Readers with enhanced
video, two-way audio, smart call routing and touchless PIN code access, offering multi-factor authentication and
access. Equipped with a 5MP camera and AI-powered call touchless entry. Its durable, tamper-resistant touch keypad
routing, the reader supports hands-free access via mobile prevents wear-and-tear and spoofing for enhanced security.
devices, key cards, fobs or Wave to Unlock technology. The This reader supports customizable PIN codes and provides
Virtual Directory allows visitors to easily reach their host, frictionless access via Wave to Unlock, mobile devices, key
while remote management through the cloud-based Alta cards and fobs. Managed through the cloud-based Alta
Access software provides full control of entry activity from Access software, it enables remote management, mobile
any device. unlock and seamless integrations.

Learn more Learn more

Standard Smart Reader


The Standard Smart Reader offers seamless door access
control with touchless, secure and flexible technology.
Featuring patented Triple Unlock technology, it supports
hands-free Wave to Unlock, mobile devices, key cards and
fobs, with 99.9% unlock reliability. The sleek form factor is
easy to install or integrate into new construction. Backed by
the cloud-based Alta Access software, this reader enables
remote management from any device.

Learn more

23
Additional resources
Commercial access control systems

How to choose the best door access


control system for your business

Cloud vs. on-premise security systems:


How to choose the right system

How to choose a multifamily door entry


and apartment access control system

​​
Securing your business storefront with
retail access control

Physical security is changing fast. To stay ahead of


new safety and security challenges, organizations
need scalable security solutions that enable
them to detect and respond to incidents in real
time. Avigilon offers intelligent products and
technologies that integrate to form a connected
safety and security ecosystem that helps you
make faster, more informed decisions and close
the response gap.

Get expert help today

Disclaimer: The information provided in the Ultimate Guide to Access Control is for informational
purposes only and is not a substitute for professional security advice.

Motorola Solutions, Inc. 500 West Monroe Street, Chicago, IL 60661 U.S.A. motorolasolutions.com
© 2024, Avigilon Corporation. All rights reserved. MOTOROLA, MOTO, MOTOROLA SOLUTIONS, and the Stylized M Logo are trademarks
or registered trademarks of Motorola Trademark Holdings, LLC and are used under license. All other trademarks are the property of their
respective owners.10-2024 [JMS02]

You might also like