Controlling access to business facilities and private property is often a requirement in today’s world, even more so than in the past.
Application varies, of course, but you might see anything from keypads to biometric scanners on doors, gates, or other entry and access points throughout a facility. These systems are in place to protect company assets and employees from both internal and external threats.
In the past, integrating these access control systems with security cameras to create a more comprehensive solution
Now, however, with advances in IP network surveillance and access control technology, we can design and implement much more complex and useful systems that integrate high quality CCTV cameras with access control systems.and allow for true identification and cataloging of individuals or vehicles was difficult, clunky, low quality, and plagued with functionality issues.
CCTV Camera & Access Control Integration Video
These complete access control surveillance systems capture photo and video of the user, which is then attached to the access logs for archival and review purposes. Data is transmitted over the facilities computer network, stored using network attached storage devices, and is even accessible via mobile devices.
More complex security camera and access control systems use facial or license plate recognition, along with other forms of authentication, to allow or deny entry to individuals or vehicles.
Administrators can review video and data logs, and even control access functionality, such as locking or unlocking a door, remotely from their phone, tablet, or laptops. Real-time text and e-mail alerts, multi-level authorization, event triggered recording, and integration with alarm and fire systems are all features we also include in many installations.
This type of access control functionality was unheard of just a few short years ago, when it was only seen in TV shows and movies, but is becoming more commonplace today as companies and enterprises tighten security to cut internal losses and protect themselves from external threats.
Both Access Control software and Video Management Software (VMS) have become vital components in modern security systems. However, many are confused as to how exactly the two should be deployed.
It is important to get this right, as the two have very different strengths and features, and deploying the wrong one as the front end could leave end users without features that could be useful, or even vital to their security system.
In this article, we will examine the strengths of both Access Control and VMS, and how the two can be used to enhance each other and provide a better all-round security system.
The Strength of Access Control
Access Control systems are designed with immediacy in mind. Whenever someone interacts with the system, by swiping an ID card for example, the system immediately informs the operator who is requesting clearance, and what they are attempting to access.
Access Control systems are designed with immediacy in mind. Whenever someone interacts with the system, by swiping an ID card for example, the system immediately informs the operator who is requesting clearance, and what they are attempting to access.
It does this by accessing an extensive database, which can include information such as names, pass codes etc.
One striking aspect of this process is how the system relies on the person in question co-operating with it; in order to be effective, it requires the subject to willingly interact with the system. Let's take, as an example, a member of staff walking up to a door to swipe their ID card; they actively wish to be identified as they know they are.
Access Control software, even with video integration, is designed for this type of installation. Video functionality is often a basic “live video” pop up, giving visual verification along with the Access Control database information.
Unfortunately, Access Control systems are ill-equipped to deal with an intruder actively seeking to bypass the system by forcing entry through a door or gate. It is also limited when dealing with intruders bypassing controlled entry points altogether by forcing entry through a window or fence. In cases such as this, basic video display in the Access Control software provides limited information beyond the initial alarm, making it difficult to establish precisely what happened and has limited pre and post-event video analysis capabilities.
The Advantages of Video Management
This is where VMS comes into its own, with its more proactive nature allowing it to detect intruders whether they choose to engage with the surveillance system or not.
This is where VMS comes into its own, with its more proactive nature allowing it to detect intruders whether they choose to engage with the surveillance system or not.
This means that VMS can provide a complete visual account of events before during and after an incident, leaving operators in no doubt as to what transpired.
Indeed, the ability to review evidence from before during and after an event is one of VMS' greatest strengths. Designed with a more forensic-based approach in mind, VMS features tools, such as thumbnails and bookmarks, to allow specific clips to be marked, searched and reviewed effortlessly. The footage can then be easily exported to the appropriate authorities.
This means that VMS can quickly establish a detailed timeline of events leading up to and following the main incident, which can provide vital information in an investigation, or key evidence in a trial. IndigoVision's Control Center even water marks video, both at the point of recording and again at the point of export, to guarantee that the video is authentic and has not been tampered with.
The superior analytics the VMS supports such as motion detection are another asset, as they offer a wider variety of logics to trigger alarms. In the case of IndigoVision's Control Center there is an additional benefit in the form of Activity Controlled Frame rate, which allows cameras to function at low frame rate and only increase to full frame rate if an analytic is triggered with no impact on video quality, while greatly reducing storage.
It is also worth noting that the VMS offers far more comprehensive surveillance, for example if a building is protected by Access Control alone and a car outside is stolen, the system will be of limited help. A strong VMS however could capture the incident and provide valuable evidence to resolve the situation.
So while Access Control performs one specific function exceptionally well, VMS is able to provide the security surveillance for a variety of areas of the property to be secured, creating a more adaptable and comprehensive surveillance system. All of these features mean that VMS is highly effective in open areas, areas of high traffic where checkpoints are not feasible, or areas with multiple points of entry, such as an airport.
Integration – The Best of Both
With this in mind, it should come as no surprise to learn that Access Control and VMS providers have been working to integrate with one another.
With this in mind, it should come as no surprise to learn that Access Control and VMS providers have been working to integrate with one another.
This allows Access Control systems to employ more video functionality such as live & playback video and PTZ control & export, while VMS can monitor Access Control events such as elevator control, card tracing and advanced door monitoring.
In most cases though, it is still best to deploy Access Control and VMS side by side, as this creates a more robust and well-rounded system. If the security system has been designed around limited entry points, with Access Control entry, and the operator only requires a basic visual verification, then Access Control software may be sufficient.
However, the more advanced analytics and forensic capabilities of VMS, combined with its versatility and wider coverage, make it better suited for monitoring larger areas with numerous entry points. Therefore in these environments, VMS should be the front-end, with an integrated Access Control plugin to allow management of events and alarms.
No comments:
Post a Comment