Security Magazine logo
search
cart
facebook twitter linkedin youtube
  • Sign In
  • Create Account
  • Sign Out
  • My Account
Security Magazine logo
  • NEWS
    • Security Newswire
    • Technologies & Solutions
  • MANAGEMENT
    • Leadership Management
    • Enterprise Services
    • Security Education & Training
    • Logical Security
    • Security & Business Resilience
    • Profiles in Excellence
  • PHYSICAL
    • Access Management
    • Fire & Life Safety
    • Identity Management
    • Physical Security
    • Video Surveillance
    • Case Studies (Physical)
  • CYBER
    • Cybersecurity News
    • More
  • BLOG
  • COLUMNS
    • Career Intelligence
    • Cyber Tactics
    • Cybersecurity Education & Training
    • Leadership & Management
    • Security Talk
  • EXCLUSIVES
    • Annual Guarding Report
    • Most Influential People in Security
    • The Security Benchmark Report
    • Top Guard and Security Officer Companies
    • Top Cybersecurity Leaders
    • Women in Security
  • SECTORS
    • Arenas / Stadiums / Leagues / Entertainment
    • Banking/Finance/Insurance
    • Construction, Real Estate, Property Management
    • Education: K-12
    • Education: University
    • Government: Federal, State and Local
    • Hospitality & Casinos
    • Hospitals & Medical Centers
    • Infrastructure:Electric,Gas & Water
    • Ports: Sea, Land, & Air
    • Retail/Restaurants/Convenience
    • Transportation/Logistics/Supply Chain/Distribution/ Warehousing
  • EVENTS
    • Industry Events
    • Webinars
    • Solutions by Sector
    • Security 500 Conference
  • MEDIA
    • Interactive Spotlight
    • Photo Galleries
    • Podcasts
    • Polls
    • Videos
      • Cybersecurity & Geopolitical Discussion
      • Ask Me Anything (AMA) Series
  • MORE
    • Call for Entries
    • Classifieds & Job Listings
    • Continuing Education
    • Newsletter
    • Sponsor Insights
    • Store
    • White Papers
  • EMAG
    • eMagazine
    • This Month's Content
    • Advertise
  • SIGN UP!

Access in a Protected Space

December 15, 2003
Intrusion detection devices alone do not make up an effective security system. Security systems must have a controlling method acting as the traffic cop to manage and disseminate what the devices detect.

In its most basic form, the security system contains a security system control panel, which houses the electronics to monitor and supervise the electronic intrusion detection devices, an alphanumeric keypad used to arm or disarm the control panel and provide status of the system, and a telephone dialer to contact the authorities.

Firmware

The control panel is software driven by the use of a factory programmed computer chip known as firmware. The firmware contains all of the information the control panel needs for the user to develop operating parameters using the alphanumeric keypad. An example of required information includes: type of intrusion detection devices installed, detection zone definitions, time schedule for when the devices should monitor for intrusion, entry exit delay, supervision to tell when a device is tampered with, user arm/disarm pass codes and the authorities’ telephone numbers. These basic features are most commonly used in all security systems and do not require use of a dedicated computer to manage the information.

More sophisticated access control systems have a feature set to monitor and control alarms at the access control computer. Until recently the systems lacked the ability to arm/disarm the alarm zones at the protected space. Typically alarm zones were either time scheduled to automatically arm/disarm, or an authorized user would manually perform the function at the access control computer. Due to the recent demand by users for increased security measures, access control manufacturers have been integrating the characteristics of the standalone security systems into their access control systems. The use of arm/disarm alphanumeric keypads is a standard in the access control system’s security monitoring and control feature set.

Protected Space

Keypads may also control user access to a protected space. The use of keypads in combination with a card reader add an additional level of security by requiring the user to present an access card to the card reader and then enter a valid personal identification number into the keypad in order to be granted access by the access control system. There are several different varieties of keypads available from numerous manufacturers. Keypads are available with either an LCD alphanumeric display or a basic LED indicator display. Alphanumeric display keypads are more sophisticated than the LED models due to the firmware and application programming requirements of the access control system.

Some access control systems now use keypads to not only grant access to a protected space but also to separately arm or disarm an intrusion device or group of intrusion devices. This feature has become an invaluable tool for adding an additional layer of protection to a security-sensitive area. Arming and disarming intrusion devices can be achieved a couple of different ways. Either by the entry card reader and/or keypad, or a separate keypad installed inside the protected space. When an access controlled door is unnecessary or impractical the space can be protected by the arm/disarm keypad. Therefore a protected space can still be monitored for alarms by the access control computer, yet additionally allow access via the arm/disarm keypad located inside the protected space without requiring user intervention at the card access computer.

These features have made it easier for the administrator of the access control system to manage intrusion devices not associated with an access-controlled door. From the access control computer, the administrator can easily perform many tasks, including receiving real-time status of the protected area and force arming a protected area that is unoccupied. Given that the personal identification numbers are an integrated element in the access control system user database it is convenient for the system administrator to manage and track each user’s PIN at any associated keypad. With these added features available in a standard access control system, the end user has the additional tools necessary for the protection of critical assets.

Share This Story

Looking for a reprint of this article?
From high-res PDFs to custom plaques, order your copy today!

Recommended Content

JOIN TODAY
To unlock your recommendations.

Already have an account? Sign In

  • Iintegration and use of emerging tools

    Future Proof Your Security Career with AI Skills

    AI’s evolution demands security leaders master...
    Security Education & Training
    By: Jerry J. Brennan and Joanne R. Pollock
  • The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report

    The 2025 Security Benchmark Report surveys enterprise...
    The Security Benchmark Report
    By: Rachelle Blair-Frasier
  • The Most Influential People in Security 2025

    Security’s Most Influential People in Security 2025

    Security Magazine’s 2025 Most Influential People in...
    Most Influential People in Security
    By: Security Staff
Manage My Account
  • Security Newsletter
  • eMagazine Subscriptions
  • Manage My Preferences
  • Online Registration
  • Mobile App
  • Subscription Customer Service

More Videos

Sponsored Content

Sponsored Content is a special paid section where industry companies provide high quality, objective, non-commercial content around topics of interest to the Security audience. All Sponsored Content is supplied by the advertising company and any opinions expressed in this article are those of the author and not necessarily reflect the views of Security or its parent company, BNP Media. Interested in participating in our Sponsored Content section? Contact your local rep!

close
  • critical event management
    Sponsored byEverbridge

    Why a Unified View Across IT, Continuity, and Security Makes or Breaks Crisis Response

  • Charlotte Star Room
    Sponsored byAMAROK

    In an Uncertain Economy, Security Is a Necessity - Not an Afterthought

  • Sureview screen
    Sponsored bySureView Systems

    The Evolution of Automation in the Command Center

Popular Stories

Digital, tablet and hands

The 2025 Annual Guarding Report: Unrest Inspires Upgrades in Training, Technology

Cybersecurity trends of 2025

3 Top Cybersecurity Trends from 2025

Red laptop

Security Leaders Discuss SitusAMC Cyberattack

Cybersecurity predictions of 2026

5 Cybersecurity Predictions for 2026

Green code

Logitech Confirms Data Breach, Security Leaders Respond

Top Cybersecurity Leaders

Events

September 18, 2025

Security Under Fire: Insights on Active Shooter Preparedness and Recovery

ON DEMAND: In today’s complex threat environment, active shooter incidents demand swift, coordinated and well-informed responses.

January 14, 2026

Is Your Organization Prepared to Navigate Interconnected Threats in 2026?

The 2026 threat environment will be louder, faster, and more interconnected. The most pressing risks, from global political volatility to emerging tech disruptions, will challenge organizations to act amid ambiguity and protect credibility in an era of accelerating uncertainty.

View All Submit An Event

Products

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

See More Products

Related Articles

  • Watch NASA Test a 4K Camera in Space

    See More
  • HID Global Takes a Logical Step in Convergence of Access Control Solutions

    See More
  • HID Global Takes a Logical Step in the Convergence of Access Control Solutions;

    See More

Related Products

See More Products
  • surveillance.jpg

    Surveillance, Privacy and Public Space

  • security culture.webp

    Security Culture: A How-to Guide for Improving Security Culture and Dealing with People Risk in Your Organisation

  • Physical Security and Safety: A Field Guide for the Practitioner

See More Products

Events

View AllSubmit An Event
  • July 17, 2025

    Tech in the Jungle: Leveraging Surveillance, Access Control, and Technology in Unique Environments

    ON DEMAND: What do zebras, school groups and high-tech surveillance have in common? They're all part of a day’s work for the security team at the Toledo Zoo.
View AllSubmit An Event
×

Sign-up to receive top management & result-driven techniques in the industry.

Join over 20,000+ industry leaders who receive our premium content.

SIGN UP TODAY!
  • RESOURCES
    • Advertise
    • Contact Us
    • Store
    • Want More
  • SIGN UP TODAY
    • Create Account
    • eMagazine
    • Newsletter
    • Customer Service
    • Manage Preferences
  • SERVICES
    • Marketing Services
    • Reprints
    • Market Research
    • List Rental
    • Survey/Respondent Access
  • STAY CONNECTED
    • LinkedIn
    • Facebook
    • YouTube
    • X (Twitter)
  • PRIVACY
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • ACCESSIBILITY

Copyright ©2025. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing