5 Sources of Savings Using IP-Based Door Access Readers
IP-based door access systems provide better security and ease of management at a much lower cost than earlier technologies.
For example, ISONAS has its Active Directory Bridge, software that automatically synchronizes Microsoft’s Active Directory with ISONAS’ Crystal Matrix access control software.
“Active Directory Bridge allows you to assign personnel to groups and give them permissions for both physical and logical access,” says Radicella. “So now instead of having to manage the access control system’s permissions separately, Active Directory becomes the single source for maintaining access control permissions, which cuts down on the time and cost of management.”
With Active Directory Bridge from ISONAS, data doesn’t need to be entered twice, eliminating double work and chances for error.
Perhaps more significantly, it enhances security by immediately reflecting any access changes. For example, if someone is fired, as soon as that data is entered into Active Directory, their access card and/or keypad code will be deactivated in the ISONAS system in real time, so you don’t have to worry about updates being entered too late after the separation event—which can lead to unauthorized access.
No. 4: Integration with Other Systems
IP-based access control systems allow the implementation of deeper, richer security systems, particularly through their integration with IP video systems and intercoms.
“Until a few years ago, video management systems and access control systems were completely separate, often proprietary, and required separate wiring and installation, management software and multiple maintenance contracts” says Radicella. “With an IP-based network device and software it is much easier to integrate video management and access control systems offering a “Best of Breed” approach to unified systems.”
In addition, by connecting intercoms to IP cameras, for example, a remote person, based on visual verification of an individual’s identity, can manually release the door. T
he audio connections go through the camera and find their way back to the safety station that’s running the video management software. When someone pushes the call button on the intercom, it notifies the safety station by an alarm sound and the safety officer can see and talk to the person at the door. They can then unlock the door by pushing a button on their computer screen and record the event in the access control system.
No. 5: Scalability
Finally, there is the matter of scalability. IP systems are ideal for meeting changing needs as new card readers are added, offices are leased or built, there are mergers or acquisitions. Expanding the door access control system is as simple as installing the reader and hooking it into the network and, occasionally, installing an additional Ethernet switch.
Since IP systems can be installed anywhere there is a network connection, multiple buildings at the same or remote locations can be connected over a LAN or WAN and easily communicate to the central control software on a computer in one of the buildings.
With this type of system, a business can scale up from one to 1,000’s of doors per single server by simply adding new readers as needed at a predictable cost per door using the same single cable installation. This takes much of the complexity and about one third of the cost out of the decision to install or expand a door access system.
Security Is Our Business, Too
For professionals who recommend, buy and install all types of electronic security equipment, a free subscription to Security Sales & Integration is like having a consultant on call. You’ll find an ideal balance of technology and business coverage, with installation tips and techniques for products and updates on how to add sales to your bottom line.
A free subscription to the #1 resource for the residential and commercial security industry will prove to be invaluable. Subscribe today!
Recommended For You
Cloud security can present a paradox: companies love the flexibility and versatility of cloud security management, but are unsure if the cloud itself is secure enough to house their vitally important systems.
From processing power to lens selection to proper positioning, here are 13 tips to help shed light on proper installation of cameras in low-light conditions.