Join or Sign in

Register for your free asmag.com membership or if you are already a member,
sign in using your preferred method below.

To check your latest product inquiries, manage newsletter preference, update personal / company profile, or download member-exclusive reports, log in to your account now!
Login asmag.comMember Registration
https://www.asmag.com/rankings/
INSIGHTS

Controller options for access control

Controller options for access control
Within a physical access control system, the decision to grant or deny access to a cardholder normally happens at the door controller located at the individual door or centralized with one controller handling multiple doors. The controller handles the authorization process, determining who has access to a particular door and if they can enter, or sometimes exit, an area.

Within a physical access control system, the decision to grant or deny access to a cardholder normally happens at the door controller located at the individual door or centralized with one controller handling multiple doors. The controller handles the authorization process, determining who has access to a particular door and if they can enter, or sometimes exit, an area.

Deciding which system architecture is right for a particular installation means closely examining the pluses and minuses of each of these scenarios and settling on the one that makes the most business and security sense for an organization. Sometimes the decision is determined by the configuration of the building. For example, deploying individual controllers at each door location means that technicians will need easy access to service and maintain each one. Does the physical set up or aesthetics require the controllers to be placed under ceiling tiles? While certainly doable by reroute people to different access points while the controller in the ceiling is being serviced. This may be a small inconvenience, but it is sometimes an important consideration for hospitals and healthcare facilities, where ceiling disruptions require the area to be cordoned off for a period of time.

An IP reader at the door, which bypasses the need for a control panel, can provide easy installation and quick access to database information. The only caveat is that information and wiring located on the unsecure side of the door is prone to tampering, vandalism and hacking.

Another option is to locate the decision-making power at the server, which can be viewed as a more efficient choice. However, since each real-time access decision is taking place over the network, this option is inherently less reliable. If the network goes down, or the server goes down, so do all of the doors.

There is also the option these days of centralizing system management in the cloud. While this set up can work well for reporting and processing activities, putting the real time card access go / no-go decision making power in the cloud isn't widely embraced yet.

The key is to look closely at what is required of the access control system, its size and potential for growth and then select a configuration of single or multi-door controllers that best meets the overall needs and security considerations of the business. It's not a matter of right or wrong choices, but rather having the luxury of customizing your access control scheme.

Subscribe to Newsletter
Stay updated with the latest trends and technologies in physical security

Share to: