Tuesday, October 8, 2013

IP Door Access Control: Retiring the Key Ring

In our previous post we looked at how the security industry's adoption of IP cameras changed the lonely night watchman into a technology-savvy security officer. Today we take a  look at how IP door access control has made his set of keys all but unnecessary.

The night watchman’s scheduled rounds were marked not only by his flashlight’s circle of light but by the sound of his keys as he unlocked and relocked each door as he made his rounds





With IP door access control in place, a key is of no use since each door’s lock  is controlled by the intelligent card reader mounted at thedoor. The reader contains all the intelligence that is needed to read and validate any company access card presented to it by any employee authorized to use that particular entrance. The guard just swipes his proximity credential  in front of the IP reader. Validation is instant and the lock is de-activated.


Accountability

At one time, night watchmen had to verify they were carrying out their duty by logging in at certain points of their patrol, by signing their name and noting the time. IP door access control software automatically captures this information when the guard swipes his credential, not only validating that the officer has passed through this site, but providing a timetable for any forensic investigation that may arise in the future.


 Being connected to the company’s  ethernet  network and powered by PoE  means there is no need for a central control panel box or even a power outlet. So the security guard has none of the connection problems or power outages faced by ye olde night watchman. 

Employee Access

Today’s video management software means the security guard  no longer has to check each worker’s ID badge or rely on recognition. Although a guard is usually present to provide manual entry if required, his presence is not required thanks to access control software.
Once administrators have customized the software to specify the entrance an employee is authorized to use, and during what hours, it sends that information to the reader mounted at that door. The reader processes the commands stores the information so that when the employee presents her credential, it deactivates the lock if she's authorized (or doesn't, if she's not.)
This allows the security guard to stand  apart from the process, and not  have to put up with anger, frustration  or arguments if entry is denied. The matter is beyond his control.

 Visitor Management
Visitor Management software can automate lobby security, freeing up security personnel for other
duties. No longer is it necessary for hospitals to use security guards to greet and process visitors at the information  desk or for school’s to station a guard in the entrance lobby to verify a parent coming for a scheduled teacher conference.  Using Visitor security management software installed on a PC, hospital volunteers or school clerical staff can confirm a visitor's identity, capture information from his photo ID and issue a temporary visitor’s pass with hardly any typing and print professional quality visitor badges withing seconds.


Remote Access Control

The Ultimate Security Triumvirate: IP camera + IP Access Control + IP intercom


Some guard duties involve manual control of locked entrances as in the case of a bank vault or safety depositroom , a high security prison, or a loading dock after regular business hours. Whereas Ye Olde Night watchman was forced to go to the door, the security officer of today can monitor, converse with, and grant entry to those seeking entry without leaving his desk, thanks to IP connectivity.



Although easy to install, several devices and types of software must be installed.
      ·         IP camera with two way audio
·       An   IP intercom to be connected to the video in and video out connectors of the IP camera
·         Video Management Software to provide doorbell notification
·         Electric Door lock and IP access control software.

 Using these configured items, let's look at scenario in which a bank employee seeks admittance to the vault.

  1. She rings the bell on the intercom. 
  2. The sound comes to the guard through his computer's speaker
  3. The employee appears on his monitor
  4. He converses with her via his computer’s mic 
  5. Satisfied with her identity, he deactivates the electric lock via the access control software.


If the guard needs to monitor the surrounding area before granting entry, a standalone IP camera is used but often such a camera is not positioned to capture the entrant's face. If the guard needs a head on view, an inter-cam might be a better choice.

Simply put, the inter-cam is an integrated unit consisting of a wide angle lens IP camera inside an intercom.
Since the camera can be focused on the area a visitor would stand when using the intercom, it can provide a clear view of the person’s face.
The Inter-cam includes an interface box for connecting it to the ethernet so it’s included on the network along with the IP access control, and can be controlled by the same video management software. So, as soon as the guard confirms the vistor’s identity, he can deactivate the lock right from his station.

And so, thanks to IP technology, the security guard's life is easier, yet more complex. More complex because as noted in the previous post, he does need basic technical knowledge about IP technology and video management software; easier because he does not have to spend so much energy patrolling the facility.
And as far as his welfare is concerned the news is good and bad. Good because an IP camera allows him situational awareness, no longer venturing into the unknown dangers ye olde night watchman faced investigating intruders in the dark. Bad because with all that technology at his fingertips he’s going to gain weight if he doesn’t get up and walk once in a while!

To learn more about how IP cameras, IP door access control, and IP intercoms and inter-cams can improve your facility's security, call 914-944-3425 to speak to one of Kintronics sales engineers or just fill out an information request form on http://www.kintronics.com/RequestInfo.htm