( by Mr. Henry Pang, Product Development Manager )
 
Security issues have always been the major concerns of companies the world over and requirement for building access system is on the rise in these modern days to protect your profits by keeping revenue-generating equipments secure, safety of your employees intact and ensuring the value of your business money. Regardless of the size of your site or premise, installation of secure access system provides a peace of mind knowing that your assets and staff are protected. Equally important is the fact that centralized access system reduces cost of managing remote sites with a one-stop control access system accessible from one central terminal. Understanding what you require in creating a building access system is key to having an effective and reliable system for the benefit of all.
 
Why Do You Need A Centralized Access System?
With industrial crime on the rise, basic security features for your sites are not sufficed. Goods disappear everyday without careful monitoring, staff cheat time everyday with “buddy punching” and sites are prone to intrusion if they are not well protected. If you think that you have locked your premise, think again. Basic lock and key system is vulnerable to intruders and it is not a surprise fact that employees, ex-employees and outside contractors committed this type of criminal activity because they are familiar with your company’s locking system. A modern access system should be able to protect your premises and more. To ensure that you have an effective access system, only authorized personnel are allowed to enter your site and every log of entries and exits are recorded for attendance and audit.
 
What Are Required For A Complete Building Access
System?
Deployment of a complete access system requires a careful planning. All aspects should be considered for you to get the most out of your purchased system. Do not rely solely on your supplier to give you the answers that you need. What you need to do is to explore some questions and do your own research to get an optimum value for your money. Start with what systems are you currently having and what do you want to have when you deploy a new access system? Having an alarm monitoring system and an access control in one single system is a good investment as you are getting two benefits in one installation but do you only need alarm? Do you require a surveillance system for visitors as well? How about time attendance system for your employees? The question is, shall you install all of these requirements separately at separate time or you could get it centralized into a system at one time but your budget might be compromised or you get a system that could accept other system at a later time but keeping everything centralized at one server location. It’s simply practical to deploy the last option because it gives you flexibility in choosing your own system at a workable budget and at your own preferred schedule. Therefore, it’s important to consider having a door access controller for this purpose.
 
Important Elements To Consider In Building A Well Designed Access System
Server
A station interfaces with your site controllers to provide a centralized management system for your entire system.
 
Controller
Controlling a local access at remote site, where it maintains a list of personnel authorized to access the facility. This controller should know which personnel could access which doors during which days and hours. All valid entries, exits, and other actions are recorded in the controller. A good controller should maintain a history log that records a running tally of each individual site access and the capability to operate autonomously (independent of the master/server)
 
Entry Control Unit (Slave)
These units are mounted on the interior site, behind the main input device. As access code that is read by the input device is accepted by the ECU and sent to the controller or master station for verification. If the verification is done, the ECU will release the door strike.
 
User Input Device (Master Unit)
These devices such as biometrics readers, proxy card readers are mounted to a wall and they send codes to the ECU for verification.
 
Important Features to Look For in An Access System
Centralized Management
Do not settle for patchy system management. Your access system must be manageable from a central terminal. Monitoring your access points from a single platform that can be accessed remotely is important to ensure overall system effectiveness and redundancy of workload.
 
Accept A Variety of Input Devices
A good access system should be able to support a selection of user input devices that using Wiegand.
 
Detailed Logging
Your access system should log every entry to your sites for you to know exactly who accessed your sited ad when they did so. These logs are important in the event of vandalism, theft, break in or emergency.
 
Sufficient Size for Your Network
Do not think only now, think of an expansion 5 years down the road. What do you want achieve in your enterprise and make sure that the system you choose could contain sufficient size for your network.
 
Access Scheduling
An access system that cannot limit or schedule access timing does not deserve consideration. Make sure that your sites can only be accesses when they should be to minimize risk of criminal activities.
 
Multiple Communication Options
Your access system must support multiple paths for upstream communication which include LAN and serial. TCP/IP technology or LAN has matured significantly in access control business and the availability of this connection type is always sought after.
 
Independent Door Control
Your access system must be able to control each door at your facility independently. Don’t let employees to access to any doors at their liberty. Exercise control over restricted areas.
 
Web Browser Access
You need to be able to view detailed information about your remote site and a system that has a built-in web-browser interface is ideal.
 
Peer to Peer Relationship
A server is not invincible. It’s exposed to defect and downtime. In ensuring that access system is working properly even in the event of server down, communication between door to door without relying on the server must be established.
 
Video Surveillance
A good access system must be able to not only do monitoring on environment and equipment, it’s also must be able to monitor personnel and visitors movement. Video surveillance is especially useful when used in conjunction with an access system.
 
By knowing the elements and features required in deploying an effective access system, you know what questions to ask for from your supplier and you know what could be your requirements for your sites. In choosing a controller, do not go for serial cable connection if you are looking for a system that could respond in almost real time. Watch out also for suppliers who claim their products have IP connection when in fact they are offering RS485-IP master controller, which on the surface looks IP but still using serial cable speed connection. The most popular controllers in the market offer control of 1 to 4-door only, more than that would be ineffective in terms of operation.

Look for devices that could connect to the controller and most commonly used protocol is Wiegand. FingerTec products are all equipped with Wiegand-26 bit, suitable for most controllers in the market. FingerTec products can be installed standalone and networked, either with controller for a more comprehensive access system solution or for a basic door installation.

 
Any comments or feedbacks please email to editorial@fingertec.com
Copyright © 2010 FingerTec Worldwide Sdn. Bhd. All rights reserved.