Integrated Access Control

What is the importance of access control system for any enterprise and how it helps in regulating the processes?

Access Control system is a unique system in many ways. ACS is a customized application for any enterprise as it regulates movement of people based on who can be where at what time. Different organizations achieve different goals by implementing access control systems:
  1. Manage security for high security areas
  2. Manage process of Operations/working
  3. Manage compliance as per Industry Standards
  4. Manage Time & Attendance
  5. Manage Vehicle Parking
  6. Manage Visitor/ Vendor Movement
  7. Manage Asset Tracking
  8. Manage Online human tracking
  9. Manage Fire Compliances for evacuation drill etc.
  10. Manage Contract &Labour movement
Everything in Access Control System revolves around ID. Based on ID, we can make a blacklist and whitelist of all kinds of people visiting the facility. To a person’s ID, we can attach sub-IDs and Asset IDs for working in a more manageable way. So, ID management becomes the stepping stone of having an effective Access Control System. Every person before enrolling in the system has to go through an ID Management Process wherein all critical data like photograph, government ID, biometric of all 10 fingers and other relevant documents are digitally stored and they are verified as per user requirements. Once verified by ID Management software, user is given a level for getting enrolled in Access Control System. For a multi-locational organization, all these records of different units are managed centrally. By applying ID management software, we make sure to manage blacklisting of people, organizations and manage people, organizations who re-visit or re-join the company. People may change their identity but they cannot change their biometrics. Strict adherence has to be complied after Enrolment process of a person in Access Control System to happen strictly after ID management processor ID Management to HR, then to Access System as per the process of organization. We can have modules for training – process based training or security or safety training. If the training is not done or not renewed, then identity management system will deactivate the individual entry via access control system. All the logs (event and alarm) of people movement inside the organization should be kept for three to six months. It is better to have CCTV integration with access control to view a video clip of every event and alarm from access control system. This means if you want to see activity of any person in access control, you will simultaneously get one minute clip of that person while entering or exiting from access control area.

What is importance of credentials in access control system and how to choose correct one.

Access control system revolves around ID. This ID is created and given to individual, based on which authorization takes place in the system. There are various types of ID credentials available having different technology capabilities to work under different type of environments. Following are some type of credentials suitable to use in different scenarios.
  • RFID Low Frequency
  • RFID High Frequency
  • RFID Ultra High Frequency
  • Bluetooth
  • Near Field Communication [NFC]
  • Bar Code, QR Code.
All kind of credentials will have different capability and properties. Some will perform under rough conditions, some are highly secured and can carry data, and some are easy to use requiring minimum infrastructure. Depending on the type of deployment like long range, short range, metallic surface, vehicle tracking, animal tracking, asset tracking, file or book tracking, people tracking etc. will require choosing the right kind of credentials for the application. Nowadays,biometric credentials are getting popular. Following are the leading biometric technologies used as credentials:
  • Finger print
  • Finger vein
  • Palm
  • Iris
  • Face etc.
We choose the biometric credentials as per requirement. During covid time, touchless biometric credentials are gaining popularity. Biggest challenge in biometric credential is speed and reliability of credential authentication.

How important is reporting in Access Control System [ACS]?

Report is very important in access control, so a report of access control event and alarm should be taken in automated mode and email to respective concerned people on daily or on weekly basis. Report from O &M team – Daily or weekly report should be taken from O&M Team.
  1. Changes in hardware and software of system
  2. Change in user database.
  3. System hardware failure and status.

What is Anti-pass back?

Anti-pass back is an important feature for any organization. This feature ensures that single card is not being used for multiple entries to any particular area. The user once gets into a specific area which is access controlled effectively, the user has to physically come out of the area to re-enter again. Here, the user cannot pass/ transfer his/ her card to other user to gain unauthorized access. In case of violation of Anti-pass back rule, alarm can be raised or door itself will not get open. Different types of ways to handle Anti-pass back:
  1. Hard Anti-pass back – Door does not open.
  2. Hard Anti-pass back with alarm – On violation, door does not open and there is an alarm.
  3. Soft Anti-pass back – Notification of violation of Anti-pass is there, but door opens.

What is Interlocking?

Interlocking of the doors should be managed via within access control system, hardware for integrated operation and reports. We can have modules for training – process based training or security or safety training. If the training is not done or not renewed, then identity management system will deactivate the individual entry via access control system.

What are the type of users and their responsibilities for effective management of ACS?

ACS Software uses and profiles to be well planned before allocating the profiles
  1. Super User – This user has full rights to programme the system, access all locations, control, manage and program hardware and software features. Super user also assigns other user in the system for performing in their duties.
  2. Enrolment User – Separate set of users are designated for enrolment purpose. Enrolment is highly sensitive and important job. This user also assigns the access level to all users.
  3. Monitoring User – This user monitors the system for any exceptions, generate reports, and we can have multiples of such users.
  4. Technical User – This user gets alarm from all hardware and monitored cables of the system which are non-functional. This user is responsible for technical functioning of the system. This user may be assigned some level of hardware programming and changing of hardware, if required.

What is Visitor Management System?

Visitor to be given access card depending on his movement requirements. These cards should be kept at visitor management desk in deactivated mode. These cards will get activated in Access Control Room as soon they are activated in visitor management system and allotted to someone. Visitor cards should get deactivated as soon the visit is complete and it must be shown on the last out reader. This will ensure visitor card being misused or being used multiple times by any unauthorized person.