IP Door Access Control: Retiring the Key Ring
In our previous post we looked at how the security industry's adoption of IP cameras changed the lonely night watchman into a technology-savvy security officer. Today we take a look at how IP door access control has made his set of keys all but unnecessary.
The night watchman’s scheduled rounds were marked not only
by his flashlight’s circle of light but by the sound of his keys as he unlocked
and relocked each door as he made his rounds
With IP door access control in place, a key is of no use since each door’s lock is controlled by the intelligent card reader mounted at thedoor. The reader contains all the intelligence that is needed to read and validate any company access card presented to it by any employee authorized to use that particular entrance. The guard just swipes his proximity credential in front of the IP reader. Validation is instant and the lock is de-activated.
With IP door access control in place, a key is of no use since each door’s lock is controlled by the intelligent card reader mounted at thedoor. The reader contains all the intelligence that is needed to read and validate any company access card presented to it by any employee authorized to use that particular entrance. The guard just swipes his proximity credential in front of the IP reader. Validation is instant and the lock is de-activated.
Accountability
At one time, night watchmen had to verify they were carrying out their duty by logging in at certain points of their patrol, by signing their name and noting the time. IP door access control software automatically captures this information when the guard swipes his credential, not only validating that the officer has passed through this site, but providing a timetable for any forensic investigation that may arise in the future.
Being connected to the company’s ethernet network and powered by PoE means there is no need for a central control panel box or even a power outlet. So the security guard has none of the connection problems or power outages faced by ye olde night watchman.
Employee Access
Today’s video management software means the security
guard no longer has to check
each worker’s ID badge or rely on recognition. Although a guard is usually
present to provide manual entry if required, his presence is not required thanks
to access control software.
Once administrators have customized the software
to specify the entrance an employee is authorized to use, and during what hours, it sends that information to the reader mounted at that door. The reader processes the commands stores the information so that when the employee presents her credential, it deactivates the lock if she's authorized (or doesn't, if she's not.)
This allows the security guard to stand apart from the process, and not have to put up with anger, frustration or arguments if entry is denied. The matter is beyond his
control.
Visitor Management
Visitor Management software can automate lobby
security, freeing up security personnel for other
duties. No longer is it necessary for hospitals to use security guards to greet and process visitors at the information desk or for school’s to station a guard in the entrance lobby to verify a parent coming for a scheduled teacher conference. Using Visitor security management software installed on a PC, hospital volunteers or school clerical staff can confirm a visitor's identity, capture information from his photo ID and issue a temporary visitor’s pass with hardly any typing and print professional quality visitor badges withing seconds.
duties. No longer is it necessary for hospitals to use security guards to greet and process visitors at the information desk or for school’s to station a guard in the entrance lobby to verify a parent coming for a scheduled teacher conference. Using Visitor security management software installed on a PC, hospital volunteers or school clerical staff can confirm a visitor's identity, capture information from his photo ID and issue a temporary visitor’s pass with hardly any typing and print professional quality visitor badges withing seconds.
Remote Access Control
The Ultimate Security Triumvirate: IP camera + IP Access
Control + IP intercom
Some guard duties involve manual control of locked entrances as in the case of a bank vault or safety depositroom , a high security prison, or a loading dock after regular business hours. Whereas Ye Olde Night watchman was forced to go to the door, the security officer of today can monitor, converse with, and grant entry to those seeking entry without leaving his desk, thanks to IP connectivity.
Although easy to install, several devices and types of software must be installed.
· IP camera with two way audio
·
Video Management Software to provide doorbell
notification
·
Electric Door lock and IP access control
software.
Using these
configured items, let's look at scenario in which a bank employee seeks admittance to the vault.
- She rings the bell on the intercom.
- The sound comes to the guard through his computer's speaker
- The employee appears on his monitor
- He converses with her via his computer’s mic
- Satisfied with her identity, he deactivates the electric lock via the access control software.
If the guard needs to monitor the surrounding area before granting entry, a standalone IP camera is used but often such a camera is not positioned to capture the entrant's face. If the guard needs a head on view, an inter-cam might be a
better choice.
Simply put, the inter-cam
is an integrated unit consisting of a wide angle lens IP camera inside an intercom.
Since the camera can be focused on the area a visitor would stand when using the intercom, it can provide a clear view of the person’s face.
Since the camera can be focused on the area a visitor would stand when using the intercom, it can provide a clear view of the person’s face.
The Inter-cam includes an interface box for connecting it
to the ethernet so it’s included on the network
along with the IP access control, and can be controlled by the same video
management software. So, as soon as the guard confirms the vistor’s identity, he
can deactivate the lock right from his station.
And so, thanks to IP technology, the security guard's life is easier, yet more complex. More complex because as noted in the previous
post, he does need basic technical knowledge about IP technology and video
management software; easier because he does not have to spend so much energy
patrolling the facility.
And as far as his welfare is concerned the news is good and bad. Good because an IP camera allows him situational awareness, no longer venturing into the unknown dangers ye olde night watchman faced investigating intruders in the dark. Bad because with all that technology at his fingertips he’s going to gain weight if he doesn’t get up and walk once in a while!
To learn more about how IP cameras, IP door access control, and IP intercoms and inter-cams can improve your facility's security, call 914-944-3425 to speak to one of Kintronics sales engineers or just fill out an information request form on http://www.kintronics.com/RequestInfo.htm
And as far as his welfare is concerned the news is good and bad. Good because an IP camera allows him situational awareness, no longer venturing into the unknown dangers ye olde night watchman faced investigating intruders in the dark. Bad because with all that technology at his fingertips he’s going to gain weight if he doesn’t get up and walk once in a while!
To learn more about how IP cameras, IP door access control, and IP intercoms and inter-cams can improve your facility's security, call 914-944-3425 to speak to one of Kintronics sales engineers or just fill out an information request form on http://www.kintronics.com/RequestInfo.htm