Fewer Can Be Better
For specialized installations and remote facilities, there are plenty of electronic access control solutions that make business sense. Check out these.
To ensure better security for its student housing facilities, has upgraded to exit devices on its controlled access dormitory doors to withstand greater abuse. These exit devices incorporate a deadbolt latching feature that prevents users from forcing the latch out of the jam or roller strike bar.
Bethany, a small college of national distinction, was founded in 1840 by Alexander Campbell, an educator, Christian reformer and debater, who provided land and funds for the first building and served as the College’s first president. Previously, the College had used conventional exit devices, which served well in most applications. However, dormitory doors sometimes were subject to abnormal abuse that resulted in security breaches. According to locksmith Orien Hunter, some students would pull on the doors until they wandered and the latch disengaged from the roller strike, allowing the door to be opened. Other damage included broken lever trim and doorknobs.
At first, electric strikes were used to control student access, but they did not stand up to the abuse. Damaged door hardware compromised security and had to be repaired or replaced frequently. In order to maintain the necessary security, Hunter worked with Ingersoll Rand Security Technologies, which provided a sample of the company’s recently introduced exit device and assisted with installation. Once it proved successful, several doors in the remaining dormitories were retrofitted.
houses its students in 19 residence halls dotting its north campus. Axis partner CameraWATCH Technologies has worked with the university as a contractor installing the campus wide surveillance system utilizing its fiber optic backbone. The IP video technology allowed the university to use a centralized recording center in ’s main production/server room. In addition to Axis network cameras, CameraWATCH also installed Genetec’s video management system.
To achieve its security objectives, Grambling’s IT department first set up a network to provide coverage for selected areas and then implemented network cameras to monitor residence halls, the newly constructed assembly center, the laboratory high school and property and receiving areas. Even with these improvements, Grambling’s IT department isn’t finished yet. Within a year, the university plans to implement a wireless system that detects motion in sensitive areas such as the registrar’s office, residence halls and administrative areas during certain hours. Once motion is detected, the system will send alerts to campus police in their vehicles. As a result, these types of systems will enhance the university’s ability to respond quickly. Grambling expects to be able to respond even more quickly to safety-related events. Campus police in vehicles will even be able to receive images sent directly from the network cameras to be able to identify suspects if necessary. As a result, Grambling believes it will be able to offer students the safest school environment possible.
Look for more voice authentication in smaller access control situations. For instance, VoiceVerified, a software as a service provider of voice biometric technologies, has a unique system and method of providing voice authentication to institutional customers having consumers or users. VoiceVerified is changing the way clients authenticate and protect their customers’ privacy by using their voice as the unforgettable password.
It is an IP at the door future. Or is it?
Often referred to as IP edge devices; the generic term for the practice of placing devices at the outer boundaries of the corporate network infrastructure. These often use Power over Ethernet (PoE). There is little doubt that this methodology serves some applications extremely well such as IP cameras for video surveillance. Advocates of the concept for access control hold out the promise of labor and material savings. However, the adoption of IP edge and PoE devices for security and access control applications remains questionable at best.
Consider the following. Many IP edge/PoE access control systems essentially require intelligent readers to be installed at each and every door. The relay that is used to energize the door strike or magnetic lock is located right at the door. This is the equivalent of placing your spare house key under your front mat. Anyone with minimal technical savvy could defeat this type of access system, gaining access to “secured” areas. Some manufacturers of IP readers provide anti-tamper switches in an attempt to mitigate this risk. However despite the added tamper switch, many in the industry recognize this as a significant security risk and avoid these products for this reason alone. More prudent integrators prefer to have the door strike or magnetic lock activation device or relay to be secured some distance away from the door on the secured side of the installation – as is the case with traditional panel based access control products which continue to dominate
IP edge/PoE access control equipment by its very nature is 100 percent dependant on the corporate network. Many will argue that network availability for today’s network equipment runs at 99.99 percent uptime. Impressive. However it should be noted that network maintenance in most organizations takes place at night or on weekends — the very periods when facilities are at their most vulnerable, and security is most needed, according to Steve Dentinger of Keyscan Access Control Systems.
He said that chief security officers should also consider the following: PoE has strict power limitations that regulate power to the access controller. This is further complicated by cable voltage drops due in part by cable lengths and other pertinent power related issues with PoE. As a direct result driving a quality strike or magnetic lock can be problematic as both strikes and magnetic locks when activated can severely drop the line voltage causing intermittent door activations and malfunctioning access control hardware. Manufacturers of this equipment will advise that a costly line power injector is recommended to ensure line voltage and wattage ratings are maintained at the PoE load.
There is another critical flaw with PoE in relation to its use with security and access control applications. The PoE has a power-up protocol or routine that leaves nodes (in this case readers) un-powered until a power up sequence and load impedance check has been satisfied. Manufacturers of this equipment also recommend the addition of a PoE UPS to mitigate power fluctuations and interruptions. Considerable additional unforeseen costs are incurred when an IP edge/PoE based access control system is moved from theoretical to actual implementation. One should not underestimate the hidden costs of such systems.
Some advocates reference the convenience of piggybacking IP edge/PoE access control solutions on the existing corporate network. Although tempting, just as with Internet based access control products, IP edge/PoE access control solutions open the enterprises' access control equipment and software up to nefarious activity such as hacking, and as stated earlier, hardware tampering. The age of cybercrime gangs is here, and no longer are these groups satisfied with obtaining sensitive information. They now aim to take control over PCs and their connected infrastructure. While it is not desirable to have someone hack into and view or disable a video surveillance system, imagine how much more damaging it could be if a hacker were to unlock a door; or enable or disable access control cards at will.
Dentinger suggested adopting a hybrid access control panel solution. Simply put, the emerging technology of IP edge/PoE for security and access control applications presents significant security risks, and hidden “not as advertised” costs. In the end a hybrid approach with multi-reader TCP/IP equipped access control panels provides the most cost effective and security robust solution in the access control/ security market place.
Allina Hospitals and Clinics is a not-for-profit family of hospitals, clinics and other care services dedicated to meeting the lifelong health care needs of communities throughout . Providing 24-hour security and workplace safety are priorities for Allina and were the chief reasons behind the company’s decision to add RedSky Technologies’ E911 Manager to their corporate network.
Allina streamlined and consolidated their 13 corporate offices scattered around the Twin Cities into one mammoth headquarters complex and installed a new state-of-the art Avaya communications system that supports a mix of 2,500 digital, analog and IP voice endpoints spread across 9 floors and a sub-basement. They required a scalable E911 system that supported all types of users from a single server so that location information would be kept up to date at
Can smart cards make security as convenient and routine as a credit card?
With all the problems schools face today, the Runnemede School District of Runnemede, N.J. needed an access system that would best protect the occupants of the school. The district installed a smart card access system in all three of its elementary schools.
Consider one-card convergence.
Even on a smaller size organization, security executives facing cardholders that must perform a variety of activities, the business strategy can be convergence on a one-card solution. That’s the case at . It shifted to electronic access with a central database. The bottom line: a one-card access control system that will enlarge across all the university’s facilities and needs.
A top security strategy – electronic access control – can gain strength through a diversity of security technologies, often integrated. That’s the case for a plant. Robert Bosch Fuel Systems, a manufacturer of diesel fuel injectors, created a new building-wide access control system that also integrated with time and attendance.
Products that increase security outdoors and around facilities are in greater demand today. Security executives are adding more video surveillance while extending electronic card access controls farther out from sensitive entrances of facilities.
Outdoor and perimeter sensors detect intruders as soon as they enter a protected area and before they can gain access to people or valuable assets. Outdoor sensors can be used either to complement indoor security sensors or as primary security.
Even today, some organizations and facilities, often the small ones or at remote locations, still log in visitors through a sign-in book and issue “stick ‘em” paper badges.
However, slowly but surely, enterprises are upgrading their visitor procedures as they tighten up on lobby and reception desk security. While fewer than 35 percent in a recent poll report they have security officers at the main entrance desk, many also say they have added technology or will soon purchase technology to better identify and track visitors, including contractors. There are standalone visitor management systems but they also can connect into the electronic access control system, too.