Skip to contentSkip to footer
returnToHomeBoon Edam logo
Contact

The access control system grants and manages access to certain areas of your building, while the physical security entrance operates to deter, detect or prevent unauthorised access.

What is an Access Control System?

An access control system is the method of managing access to your building, or certain areas of you building. An access control system typically consists of:

  • Access control devices, such as access cards and card readers
  • Access management dashboard
  • Hardware, such as access control panels and access control servers 

Access control systems reduce the risk involved in data- and product theft and increase employee safety. They are commonly installed with a two-factor or multi-factor identification process. They could require a card or token and a piece of information, such as a password.

5 Basic Components of an Access Control System

When it comes to rolling out an access control system at a facility, there are typically five main components:

  1. Credentials: a unique electronic “key” used by a person to gain access through a door that is secured by the access control system. The most common is an electronic access card, but it could also be a PIN, fingerprint, iris, face, a barcode from an app on a phone, etc.
  2. Credential Reader: device(s) mounted to the exterior of an entrance and used to “read” the credential(s) electronically.
  3. Lock Hardware: door hardware (either electric door locks or a security entrance) that is used to electrically lock and unlock the door or entryway to the secured area.
  4. Intelligent Controllers: boards/panels installed in a building and used to process access control activity; credential readers, electric lock hardware and other access control devices are all connected to the panels.
  5. Access Control Server Computer: the “brain” of the access control system and serves as the central database and file manager that is responsible for recording system activity.

With these components in place, a security or facility manager can tailor access privileges for each user based on a number of factors, such as the floors a user works on within a building, work hours (full-time vs. part-time), etc.

Why an Access Control System Alone is Not Enough

Access control devices are often installed alongside swinging doors with the intention of reducing unauthorised entries. However, once open, a swinging door can allow multiple users to go through on one single credential.

This is why combining electronic access control systems with physical security solutions has become increasingly popular. Integrating access control systems into speed gates and security revolving doors solves many issues concerning unauthorised access into buildings and facilities.

Anti-tailgating. Anti-loitering. Anti-passback.

Access control systems combined with physical entrance solutions provide a better way to manage, monitor and control access points in a building.

What is Tailgating and Piggybacking?

Select Your Desired Level of Security

There are several types of security entrances available today. Depending on the model you select, you can customize the security level for each area of your building. In addition, each entrance type has a different impact on guard supervision, annual and recurring operating costs, payback and more.

Here’s a quick synopsis of each entrance:

  • Tripod Turnstiles: Manual or electrical arms rotate to allow one authorized passage at a time. Effective at crowd control only, requiring constant supervision to address any crawl over/under attempts.
  • Full Height Turnstiles: Full height barrier, typically deployed on exterior fence lines. A good deterrent against casual intrusion attempts. Prevents tailgating as it will rotate once per valid authorisation, however two people can squeeze together in one compartment (piggybacking).
  • Speed Gates: Swinging or sliding barriers open to allow one user per credential. Requires supervision as tailgating is possible – alarms will notify when tailgating occurs.
  • Security Revolving Doors and Security Portals: Full height entrances provide the highest level of assurance against tailgating and piggybacking by using an overhead sensor system that only allows one person to enter through per valid authorisation. Security portals can also support an additional credential reader inside to ensure that not just one person, but the right person is entering.

What Access Control System to Integrate in Which Security Entrance?

The best combination of access control system and security entrance is based upon your specific needs. Think about the following:

  • Do you need perimeter security?
  • How many points of access do you have?
  • Should there be different authorisation rules based upon job role?
  • Should there be different time-based authorisation rules?
  • Are there any rooms or areas where you require an extra layer of security?
  • Is two factor authentication enough, or do you need multi factor authentication?

Depending on your need and level of security, there are various access control devices and security entrances you can consider. These include keypad readers, proximity card- or badge readers, RFID readers and mobile phone based readers. Some more advanced devices we offer integrated with our products are:

Popular Ways to Integrate Access Control Devices and Security Turnstiles and Doors

Now that you know the benefits of integrating access control with revolving door and turnstile systems, the next step is effective integration between the two. Integration should be an integral part of your building design from the very beginning.

Integration Techniques

The access control system really is the “heartbeat” of the security entrance. And as such, each entrance solution has a designated area for mounting the access device.

However, there are times when these mounting places may not fit your needs. For these situations, we have deployed some alternative options:

  1. Top-mounted
  2. Panel cut-outs
  3. Custom pedestals
  4. Interior-mounted

Enabling Accurate, Auditable Metricis

When integrated with your access control system, security entrances operate reliably according to their working principle – which in essence acts as a consistent standard operating procedure. This consistency serves as the basis for the gathering of data.

Security entrances can deliver a wealth of data into the database of an access control system, including completed passages, who did the passages, number of unauthorised entry attempts, emergency button usage, etc. to give you more insight into who is in your building at any given moment (mustering) and, in general, how the entrances are being used. This capability gives your organisation reliable data that be used for future planning.

Remote Access Control Systems

Security entrances help you manage the different flows of people through your reception or lobby. Employees can use their authentication cards or passes, but the same cannot be said for visitors. Usually, a receptionist or security guard grants them access to the building. This is where there is a need for a remote control panel. We offer the following remote control panel:

Going Beyond the Swinging Door and Card Reader

As mentioned above, credential readers collaborate with the access control system to confirm or deny entry to users. Traditional methods utilise card readers mounted on swinging doors, however, security personnel are finding weaknesses in this method for mitigating unauthorised entry.

Weakness 1: Swinging Doors
Swinging doors with a credential reader are locked until a valid credential is presented. However, once that door is unlocked it can be held open for a number of other unauthorised users to come through. Cameras can record these instances and drive employee education, but the risk of infiltration is still there. In addition, a breach could cost an organisation significantly, especially if the government regulates it.

Weakness 2: Card Readers
In addition to moving away from swinging doors, organisations are also deploying access devices that allow for two-factor or multi-factor authentication. An access card can be stolen, but it is far harder to replicate a key code, barcode, or a unique biological trait, like a fingerprint or iris pattern. 

Because of these two weaknesses, more and more organisations are using access control systems in conjunction with revolving door and turnstile entry systems. In fact, this integration is really the only way to effectively and proactively mitigate unauthorised entry.
 

Looking for More Information About Access Control Systems?

If you need help in deciding which access control system is best suited to fit your entrance, contact your local Entry Expert for advice.

Boon Edam office worker, smiling at her computer desk

Need Advice?

Contact our Entry Experts, who are ready to support you.