More than just physical security
If you decide to use an access control system, it’s probably because you want to secure the physical access to your buildings or sites to protect your people, places and possessions. That’s just the start for access control systems though. The right system, used well, can add value in a range of ways. You can use it, and the data it generates, to boost not just security but productivity, creativity and performance.
You can even use access control to help increase happiness and fulfilment. This is really important for us because we believe security isn’t just about technology – it’s about how people live their lives and about helping them make the most of their days.
The basics of access control
Let’s take a step back though and look at the fundamental principles and techniques behind access control systems.
What’s wrong with a key?
Many smaller organisations use mechanical keys to lock their doors. But this method of access control has several flaws and limitations, especially as an organisation gets bigger. Below are just some of the problems presented by using keys.
• People lose keys
If someone loses a key you need to replace the cylinder to make sure the lost key can’t be misused. Once you’ve replaced the cylinder, you need to hand out new keys to everyone else that needs access to that door.
• Keys don’t leave an audit trail
You can’t see if and when someone’s used a key to open a door, so you don’t know who’s entered your building or at what time.
• Keys are difficult to manage
If someone needs access to a wide range of buildings and rooms, they’ll need to carry an inconveniently large number of keys. It can be difficult to remember which key is for which door and it’s a security risk to label them.
An access control system can take away the downsides of using mechanical keys.
- Who has access.
- Which doors they have access to.
- What times they can gain access.
- Under which conditions they’re allowed access.
Best of all, an access control system allows you to set these parameters for each individual and you can quickly and easily update them at any time.
Watch the video to learn more about the flexibility of AEOS Access Control
Other identifiers for increased security
Although access cards are the most common method for identifying yourself to an access control system, there are other options, including some that offer higher levels of security.
Basically, it comes down to following identification methods:
- Something you have – for example an access card or badge or other identification tag.
- Something you know – like a PIN code or (more often for IT systems) a username and password.
- Something you are – biometric identifiers such as your fingerprint or iris.
Each identification method has pros and cons, so the method to choose depends on the situation.
To increase your security standards, you can combine two different identification methods – for example an access badge and a PIN code. This is called verification; you use the first method to identify yourself and the second to verify that it’s actually you.
Get expert advice tailored to you
The good thing with access control systems is that most of them are very flexible and can often be tailored to your specific needs. Without knowing the details of your situation, it’s impossible to specify which access control type or identification method is best for you. So always contact a professional for detailed advice and guidance to help you get the most out of your access control system.
Frequently asked questions
At a very basic level, access control is a means of controlling who enters a location and when. The person entering may be an employee, a contractor or a visitor and they may be on foot, driving a vehicle or using another mode of transport. The location they’re entering may be, for example, a site, a building, a room or a cabinet. We tend to call it physical access control to differentiate it from access control that prevents people from entering virtual spaces – for example when logging into a computer network.
Today, physical security is about so much more than locks and bolts. Many modern physical access control systems are IP-based, powered by smart software and able to process large quantities of data. This provides more functionality, flexibility, scalability and opportunities for integration. It also means they’re part of your IT network, so it’s essential they’re protected and upgraded – just like your other IT systems.
From our perspective, a centralised access control system is always preferable – whether you have just two locations in the same town or hundreds spread around the world. Centralising your access control brings a range of far-reaching benefits.
For the people using your building, biometrics can give a better experience compared to an access badge. These days, biometrics are used for both identification and verification – sometimes even both at the same time. Being allowed to enter your building just by scanning your hand or face makes access control more convenient than ever.
Mechanical keys are the simplest form of physical access control and the method many smaller organisations use. Even for a small company, however, using mechanical keys has several flaws and limitations – especially as an organisation gets bigger. Below are just some of the problems presented by using keys.