Consider an organization that uses face recognition analytics alongside their existing key card system:
Access to secure areas is controlled by doors equipped with key card readers.
When a person approaches the entrance to a secure area, a surveillance camera captures an image of their face.
The face recognition analytic built into the VMS instantly compares their face against a known list.
If the person is authorized, the VMS instructs the access control system to allow key card access.
Face recognition analytics can enhance access control systems in several ways:
Adding an extra level of protection while remaining unobtrusive. The near instant speed of modern face recognition keeps authorized employee traffic unhindered — employees do not need to look directly at the camera nor pause in front of it.
Avoids requiring employees to make physical contact with a biometric sensor or other device. This addresses practical concerns like dirty fingerprint readers or germ-spreading keypads.
Enhances key card systems by detecting access attempts using valid key cards not yet reported as being lost or stolen
Enhances keypad systems by detecting access attempts using shared access codes
Discourages potential tailgating attempts by notifying security of unknown or banned persons near secure areas
While the design of intelligent face recognition analytics remains cutting edge, the implementation of two-factor authentication in an access control system is a far simpler process. For example, a modern VMS like Senstar’s Symphony provides web-based interfaces to assist in the configuration and training of face recognition analytics. In terms of integrating the VMS with an access control system, the detection of an unauthorized person triggers a set of rules in the VMS, which in turn communicates the event to the access control system.
Depending on the capabilities of VMS and access control systems, different integration approaches may be required:
Combination VMS and access control system
Certified SDK-based integration between VMS and access control system
Open Platform Communication (OPC) standard
When selecting a vendor, make sure to choose one that offers both video management and access control options, as to avoid integration issues and ensure the system provides a seamless experience for the end user.
Key to the success of any security program is the ability for the organization to actually implement and follow it. Face recognition analytics make two-factor authentication feasible for organizations without imposing any additional burden or hassle on daily operations.
With intelligent video management, video analytics, access control, and innovative perimeter intrusion detection systems, Senstar offers a comprehensive suite of proven, integrated technologies that reduce complexity, improve performance and unify support. To find out more about Senstar, click here.