Access control is the backbone of physical security. As the first line of defense, it protects businesses from theft, vandalism, and trespassing. Physical access control systems are designed to restrict access in and out of an area.
A lock and key design is the most basic form of access control, but over the years the technology for access control systems has significantly grown more secure and sophisticated. A well-designed access control system has the following features:
Convenience: while making no compromises for security, it allows authorized people to go about their daily lives smoothly and move through areas without a hassle, especially for multi-site facilities
Efficiency: access is automated, and information is captured at all access points of all comings and goings, including people’s identities, time of entry, and the like
Flexibility: access can be tailored for each individual based on their role and need-to-know privileges; it can also be customized to time of entry and other parameters (e.g. authorized users can only go in within a certain timeframe)
Components of a Physical Access Control System
A physical access control system is made up of the following components that work together seamlessly to control who can enter, and when they can enter.
Personal credentials act as the “key” to gain access to an area. Each credential is unique to an individual. Common credentials include:
Readers and keypads are stationed at access points and are used to “read” and authenticate the credentials that are presented. Most modern readers are proximity readers that require the credential to be held within a few inches of the reader.
Keypads have numeric keys that are similar to a touch-tone telephone. Some readers require dual authentication, which often uses what someone has (a physical credential like a proximity card) with what someone knows (a PIN or a password) as an added layer of security.
While readers are used for authentication, a control panel is responsible for authorizing the access. Readers and keypads are connected to a control panel, which verifies if the credential is valid or not. It sends a signal back to the reader to unlock the access point if the credential is valid. If the credential is found to be invalid, the user will not be able to gain entry.
The server contains the database for the access control system. It stores user data and access privileges, system activity, as well as audit logs. The server is usually a computer that has the software used to manage the access control system.
Cloud-Based Access Control
Cloud-based access control systems are on the rise and are quickly becoming the latest trend in physical access control. Unlike in traditional access control systems where all the components are hardwired together, cloud-based systems communicate with the server via the internet.
There are two main types of cloud-based access control systems:
While traditional systems are less likely to be hacked, cloud-based access control systems offer greater flexibility, allowing authorized users to make changes from their phone or any device that has access to the web.
Planning Your Access Control System
Here are things to consider when planning your access control system:
Good physical security starts with access control. If you’re looking for assistance in selecting the right technology for your access control system, send us an email at salessupport@abscosolutions.com. Our facility vulnerability experts can help you choose the best solution tailored to your specific needs.
You can also join our joint webinar with Identiv regarding their Freedom and Liberty Access Control product lines. You can sign up here to register for the virtual event to be held on November 9, 2021.