Designing an electronic access control system is a task that requires careful consideration of various factors to ensure security, efficiency, and cost-effectiveness. As seasoned consultants in physical security systems, we understand the importance of providing comprehensive guidance to new security directors and end-users to provide them with a place to start.
Here's a detailed guide that addresses the fundamental questions to consider when determining what your company and campus requires in an effective electronic access control solution.
Cost vs. Benefit Proposition
- Cost Consideration: Electronic systems typically range from $1,000 to $4,000 per door, significantly higher than traditional locks ($50 to $500).
- Decision Making: Evaluate if the advanced features of electronic systems justify their cost. If budget is a consideration, begin by installing electronic access control on your outside perimeter doors such as entrance doors rather than every internal door.
This will create your first security layer. You can focus on additional security layers once you have your perimeter secured by creating a one, three, and five-year budget plan. Keep in mind that year one will incur the highest “per-door” cost as this is the year you create your system’s infrastructure.
- Simplification of Building Access Management: Keys do not need to be made and distributed to employees, facility, staff, students, or contractors. Misplaced keys no longer present a risk and re-keying is not required.Locksets typically run $75 or more, and a locksmith usually charges $125 an hour. This adds quickly when a master key is misplaced.
- Audit Trail: Today’s electronic access control systems provide detailed audit trails and door access reporting. When integrated to video surveillance, this is a powerful tool.
Define What You Wish to Secure: The Why.
- Identify Key Areas: Focus on securing exterior doors, vehicle and man gates, server rooms, liquor storage closets, armories, or other critical equipment or operations rooms.
- Consider Options for Guest Entry: ?Add an intercom at the guest entry doors if they are to be secure or consider keeping one set of doors unlocked during high visitor hours to allow entry to speak with reception staff.
- Prioritization: High-traffic and high-risk areas should be prioritized for electronic access control.
- Elevator Access: Implement access control in elevators through single-reader or floor-selection methods.
Something You Have, Something You Know, Something You Are. Credentials.
- Four Verification Factors: Choose from something the user has (badge, fob), knows (PIN), is (biometrics), and someone trusted verifies (manual authentication).Most often, customers elect to utilize badges or fobs are their access control credential. Badges can also serve dual purpose as employee identification cards.Also gaining in popularity are mobile credentials on cell phones. If this is something you would like to implement in the future plan for it now as the readers require custom code or hardware to facilitate the use of mobile credentials on cell phone.
- Multi-Factor Authentication: Just like multifactor authentication used by your bank’s website, you can use a combination of these credentials in access control systems for enhanced security, especially in high-security areas.For example, a user may need a combination of their key fob and a personal PIN code to access a highly controlled space. Or a combination of a biometric finger print read with an electronic badge.
Understanding Lock Options
- Lock Types: Options include electric strikes, electromagnetic locks, and electrified hardware. Each has its own applications and trade-offs.
- Selection Criteria: Consider the door type, usage frequency, and required security level when selecting a lock type.
- How do I Know? This will require a detailed inspection of each door to understand (1) how is the entry/door used, (2) what is the path of egress, (3) what is the construction of the door (glass, wood, metal), (4) what are you protecting (people, cash, chemicals).A detailed door-by-door walkthrough is the best method to understand what is required at each door.Alternatively, for new or newer construction, a door hardware schedule is invaluable and will allow for door hardware design without walking each door.
- Reader Options: Choose from keypads, credential readers (contact/contactless), and biometrics based on security needs and budget.
- Evaluate your building, campus, or facility. PIN pads are inexpensive but run the inherit risk of users sharing their PIN codes, reducing security at the door.
- Considerations: Balance the need for security with ease of use and cost. Larger readers offer greater range but may not be suitable for all locations and a mullion mounted reader may be required for complex installations on door frames.
Identifying What Else is Needed at the Door
- Additional Components: Include request-to-exit sensors, door position switches, and power supply considerations (centralized, local, PoE).
- Take the time to understand how you will use your access control system. Is it simply key replacement? Then a reader and lock is all that is required at the door. However, if you would like door forced open alerts, or door propped open alarms, then consideration must be given to adding door position switches (DPS) and or request to exit devices (RTEs).
- Integration: Ensure all components are compatible and work cohesively for optimal functionality.
- Life Safety: The use of electronic magnetic locks, or mag locks, require consideration to local and state life safety or building code. Integration to the buildings fire system may be required in these cases.
- Device Connection: The readers, locks, DPS, and RTE devices must communicate back to the system’s head end or controller.This can be accomplished either through wired or wireless options depending on the installation site and infrastructure. Additionally, you will need to determine where the door controller will reside. Most typically this is either local to the door above the ceiling on the secure side of the door or in a nearby data or electrical closet.
- Security: Ensure the network connection is secure to prevent unauthorized access and breaches.
What Type of Access Control Management System Should You Use?
- System Types: Choose from embedded, server-based, or hosted systems based on your organization's size, needs, and future scalability.
- Integration Capabilities: Consider the ability to integrate with other security systems like surveillance and intrusion detection.
Designing an effective electronic access control system is a multifaceted process that demands careful consideration of various factors, from cost to the type of authentication and system management. By addressing the fundamental questions outlined in this guide, you can start down the path of creating a secure, efficient, and tailored solution that meets your organization's unique needs.
IK Systems is more than just a service provider; we are your partners in security. Our team of experienced professionals is ready to assist you in navigating these choices, ensuring that your access control system is not only robust but also a perfect fit for your specific security requirements.
Stay tuned for our article on how to configure and manage an access control system.
Let's work together to create a safer and more secure future.