7 minute read
How to choose access control
Given the array of access control options available, what are the top tips for installers when it comes to choosing which technology suits an application? The PSI Panel is in session....
Access control is surely the security discipline with the most technology options for installers to choose from. Tags, keys, cards, PINs, biometrics and now mobile credentials are all potential methods of managing access, not forgetting the recent developments with facial recognition analytics on cameras. Integrators have an array of alternatives to consider each time they look at compiling a spec for an entry management system.
So how can installers be sure that they are specifying the most suitable and future proof systems? The experts give us their opinions:
Pip Courcoux –Assa Abloy
When specifying an access control system for a typical business, a major tip for installers would be to consider an offline solution.
In the past almost all access control solutions used conventional networking, whether this be via a bus network or over an IP network. However, in the same way that resilience has gradually been built into all ‘critical utilities’, networks are very much next. In future we would expect to see shared mobile network infrastructure both inside and outside the building through small cell distributed antennae systems.
www.psimagazine.co.uk
Since most, if not all people always carry a mobile phone with them, future access control solutions can leverage that shared infrastructure, with auto connectivity on entering a building. The move to using mobile devices is a natural trend; manufacturers and industry leaders don’t need to force this.
The flexibility and resilience mobile credentials offer will only increase as more businesses treat the mobile as an edge network device. This naturally aligns to the shift towards the Cloud and its many benefits (eg, cost savings, reliance, increased cyber security).
Against the traditional server system for storage which takes up floorspace and requires maintenance, the Cloud has not only proved itself to be reliable and cost effective, it also has the capability to minimise privately owned or deployed infrastructure.
The reduction in infrastructure creates, efficiency, cost savings and agility to adopt technology as it evolves but it also drives sustainability.
‘Sustainability’ is quickly gaining traction across business of all sizes and is responsible for driving the sixth wave of innovation. Within Assa Abloy we believe that within the next five years it will become one of the most important points when products are being specified. To prepare for this opportunity many of our newer technologies utilise a Cloud eco system and are operated via mobile credentials.
Dan Drayton –Paxton
Everything starts with the needs of the end user and researching which systems best meet those requirements. We want systems to be user friendly and intuitive too as simplicity is key to adding value.
We then look at the infrastructure and environment; for example, is there an existing and accessible IP network in the area that you want to install a system. If it is in a commercial or industrial environment, would it require a vandal-resistant solution? Or is it in an area of architectural importance? Then we are looking at more aesthetic options for readers for example.
In terms of tokens choice, if a high level of traffic through an entrance point is expected, installers and end users may look for something that is quick and reliable, which typically drives the use of smart technology by utilising smart credentials.
Additionally, if we think about the perimeter of premises, for example for vehicle control, people may want to use long-range solutions, ensuring vehicle entry and exit is a lot more seamless.
So can this procedure be simplified? How modular a system is designed can impact the product selection and installation process. Systems that have fewer components can make the design and installation a lot easier, and vice versa.
Looking at the technologies that have a rosy future, I would say that utilising smart devices is a technology that has continued to spark end users and installers’ interests. For over a decade, smart technology has helped connect people wherever they are, whether it is a workplace, or at home. The trend is now driving the access control industry, and people expect to be able to use access control technology through smart devices.
Thinking about the systems that may be facing a tricky few years, it is always easy to think older legacy technologies, for example analogue, is on the decline. In fact, in every marketplace, there are a range of needs and wants, and budget capabilities, so I think for some considerable time there will still be space in the market for all types of access control technologies.
Ian Oakley –CDVI
When choosing or specifying an access control system, the first thing to consider is the day-to-day usage of the system. The way the doors will be used and the quantity of traffic they will see will dictate which system is best suited. Who will be using the doors? Is it office workers or indoor-only users? Or is it an outdoor environment such as a construction site or engineering facility? In an indoor situation, solutions such as fingerprint readers can save time, improve efficiency, and reduce costs longterm. However, on a construction site, facial recognition might work better, as fingerprints can be damaged easily in tradespeople. Alternatively, if biometric technology is not a requirement, then card/tag solutions could be more suitable.
For access control systems, the most important thing to remember is the expectations of the customer. What do they want the system to do for them? What problems should it aim to solve?
If the system is simple, with a low number of doors and users, then cost might be a more important factor. In that case, a standalone access control solution could suffice. For a larger premises with more doors and a larger body of users, an online system is likely more convenient and efficient for day-to-day administration.
The general trends of the industry are still leaning towards biometrics as the future. While fingerprint readers are becoming more and more popular and more and more effective, they are not the only option. Facial recognition will also be very prominent, due to the ease of use and speed with which individuals can be verified and granted access.
Michael Nicholson – 2N
Installers looking to ‘futureproof’ their projects will be asking themselves two questions: How might technology develop? How might the needs of my customer evolve?
I have three pieces of advice for installers asking themselves these two questions:
First, choose a system that offers flexibility. This means IP-based technology. IP devices are easy to upgrade as new functionality emerges, and they can be integrated into complex security and home automation systems alongside thirdparty technology.
IP access control also enables users to choose between different credentials. For example, a single device can support smartphone access, fingerprint scans, RFID cards, PIN codes and/or QR codes. Customers therefore aren’t committed to the decisions they take at the time of installation – they can change their mind if they want to.
Second, prioritise cybersecurity. Cybersecurity is a becoming a major concern for customers, who understand that any device – including IP intercoms – can be vulnerable to cyberattacks. The good news for installers is that if you choose the right devices and follow the correct procedures, you can significantly reduce the risk.
Third, think hard about whether you want to prioritise mobile access control or biometrics. Smartphone credentials are the fastest-growing form of access control, primarily because they are so convenient – but also because they are secure and no longer expensive.
Biometrics, such as facial recognition technology, can be the right option in some settings. However, there are also some regulatory challenges which need to be considered. For example, in some countries, it has become impossible to use fingerprint access control or facial recognition in workplaces as a result of privacy concerns.
For these reasons, we have prioritised mobile access control but each solution has different strengths. My advice to installers is simply to think it through carefully.
Justin Hawkesford – Comelit-PAC
Before selecting an access control system, it is essential to define the objectives and requirements of the installation. What is the purpose of the system? Are there any special considerations such as time and attendance management, visitor management, or integration with other systems?
By answering these questions as early as possible and working with trusted manufacturers with dedicated technical and sales support, installers can narrow down the options. This simplifies identifying the level of security requirements from the start to ensure a bespoke system is created.
The environment where the access control system will be installed is another important factor. Is it indoor or outdoor? Is the location subject to extreme temperatures, humidity, or dust? Is the area prone to vandalism or tampering?
Installers should also take into account the wiring requirements. While some access control systems are wireless and can be installed quickly and easily, in some circumstances wireless may not be the ideal option, due to distances and possible interference.
Evaluating the technology is critical. The access control technology is evolving and advancing rapidly, but it’s important to note the features an end user requires. For example, area occupancy and fire muster allow for easy monitoring of who is present in certain areas of a building in case of an emergency. Time and attendance tracking features help organisations to monitor employee access.
Read-in or read-out options allow for customisation of entry and exit points. Visitor management allows for easy tracking and management of guests on site.
Installers can consider the benefits and limitations of different technologies such as biometrics, proximity/smart cards, and mobile credentials. They should also evaluate the scalability, flexibility, and interoperability of the system to ensure it can adapt to the future needs of an organisation.
For critical infrastructure projects, installers will need to make sure the system is following CPNI regulations, with stringent penalties in place for non-compliance.
In terms of the future of access control technologies, we can expect to see continued growth in integration and cloudbased systems. Integration is becoming increasingly popular as many organisations prefer to keep their security and building management systems under one umbrella. The aim is to simplify operations, increase efficiency and create a more comprehensive and streamlined approach to security.
Cloud-based access control systems are also becoming more commonplace, as they provide remote management and monitoring capabilities, and can be easily scaled up or down as needed.
For installers, choosing the right future-proof access control system requires careful consideration of the application, environment and technology requirements. By staying up-to-date with the latest advancements and working with a manufacturer that can offer dedicated support from a pre and post-installation perspective, we can work in partnership to provide customers with scalable solutions that meet their specific needs.