What is an Access Control system?

Access Control put simply, is a method of security that controls access both physically and virtually unless authentication credentials are provided.

System sizes can vary in size from just 1 x Single “stand alone” authentication device & hardware through to thousands of devices connected to a “network” across multiple sites worldwide over a secured network infrastructure.

Access control systems typically include “physical” entry points, such as Doors, Gates, Turnstiles, Speed gates or barriers which are integrated electronically by a controlled system that uses pre-determined configuration to authenticate the input from a device to identify valid / invalid entry requests. 

Access Control technology can also provide key environmental reporting data to identify on how a building or site is being used, such as frequency and time-usage trends.

Some examples of authentication methods 

  • Access Card only
  • Access Card and Pin 
  • Dual entry (2 x separate user cards/Pins in sequence) 
  • Bio metric (Fingerprint, facial & Retina) 
  • Smartphone
  • Key fob
  • Wireless transmitter Key 

What are the benefits of Access Control Systems?

Access Control can help protect employees and contents and control & monitor who accesses the premises. The main benefits of access control systems are:

  • Easier access for employees –No keys required when buildings are open.
  • Financial savings – Access Control security solutions can save costs for the need of use of security personnel. An unmanned access devices can accurately and securely verify a person’s identity via many secured methods of biometric integration.
  • Keep track of who enters/exits the building
    An access control system gives you data that keeps track of personnel attendance, fire safety management and tracking of staff on site should any issues or crimes be reported.
  • Protection against unwanted visitors – Invalid entry request are detected and reported and will prevent access into sites when an unauthorised party attempts to gain entry.
  • Employee Benefits – Todays working world promotes hours of working to suit the employee and their welfare requirements, with the use of an Access Control system employees have the freedom to enter working environments whenever they need without the need of waiting for someone physically unlock doors or the building having reduced security when leaving a door always open without security measures. 
  • Protection against data breaches
    Important data/information such as client health, financial & general data are often stored onto company-owned servers. 
  • Safe & Secure environment – Access control systems keep out anyone without the right credentials therefore keeping the people inside safe.
  • Reduced risk of theft – Higher valued possessions can be stored within high-risk site locations to enable users to be restricted access to these locations by authority grouping.

System Integration options


Access Control systems can be integrated with smart third-party systems such as BMS controlled features such as Lighting & temperature control. Lights can be set up to turn on when people are in a room and turn off when people leave. Temperatures can be adjusted for when a room is unoccupied to further reduce on energy costs. Integration can also be used with CCTV & intruder systems, this would provide users with Images of unauthorised entries to a defined area and will result in real time camera images being supplied by frame rates adjustments for intruder activation  events.  

Risks 

  • Access Control is simply “access control” and should not be understood as being the secured solution to protect your premisesit is advised that all external Access controlled doors are fitted with secondary physical locks to allow for the building to be secured. 
  • Lost Card/s – Systems with basic entry technology (card only) will always run the risk where a user’s lost card can fall into the wrong hands. It is the user’s responsibility to report losses and the owners responsibility to manage the system to reduce this risk.
  • Card Cloning – Lower security card technologies can be cloned due to the Clock & Data reading technology that the card stores 
  • Forced entry – Physical entry gained by an unauthorised party by using force to override locking mechanism.
  • Cyber-attack – Failure to provide correct security measures for IT system protection.
  • Data breaches – Badly managed systems user authority levels being configured by system owner allowing access of data to be accessible to other users.
  • Unsecure doors -System not allowing for the input monitoring to detect an overriding action of local emergency break glass devices.
  • No maintenance plan – Regular maintenance of access control systems is advised to be completed at least once within a 12 month period. Preventative maintenance helps ensure that the operation of all system peripherals are functioning correctly, as when the system was first installed. 
  • Compliance to Fire Safety Building regulations – All Access Controlled system designs must consider the guidance and regulations of the Fire Safety Order – 2005 to ensure that “people” within such sites are provided with a safe route of exit within the event of a fire.