Advertisement

Advertisement

Supercharge Your Specs

By Deborah L. O’Mara | Mar 15, 2016
iStock_000004807736_Large.jpg

Advertisement

Advertisement

Advertisement

Advertisement

The market for electronic access control continues to grow. It’s a sign of an ongoing upturn in future specifications. A big opportunity resides in one- to 10-door systems because these openings still may have traditional mechanical locks. However, users are migrating to electronic access control as the technology becomes more affordable. For larger systems with more than 10 doors, users are taking advantage of wireless, the ability to move to the network with Internet-protocol (IP) solutions, and biometrics as prices continue to decline.


Let’s not forget about integration. Customers are increasingly integrating or including access control with video surveillance. Used in this manner, when someone tries to access a door, the cameras immediately power up to show who is trying to enter. They can even send alerts when someone wants to gain entry to the facility with an expired credential.


According to market research firm IHS Inc., Englewood, Colo., access control will continue to trend upward. This growth is coming from traditional hardwired systems as well as wireless and biometrics, said Blake Kozak, principal analyst for IHS. About 65 percent of access-control projects are cited as having 10 or fewer doors, according to IHS.


Moving beyond the door


“There’s also strong movement in cloud-based access control, where users can log in remotely and contractors can provide managed services,” Kozak said.


Another important part of the market’s strength is the ongoing move to logical and physical integration. One example is linking human resources functions with access control and assisting with areas of compliance.


“We’re seeing use cases beyond just the door,” Kozak said. “It’s great for keeping a building secure, but now users are asking, ‘What else can access control do?’”


For example, a system can limit access to an area if technicians don’t have a current certification or failed to update 
their password. 


Another emerging area is the use of mobile credentials in the hotel, hospitality and smart-home markets, said Alexander Derricott, an IHS analyst.


“We’re moving increasingly to a single, secure sign-on to access the door and the network with mobile/smartphone solutions,” he said.


For electrical contractors, certain nuances and capabilities should be considered to make the most of technology for customers.


According to Steve Barton, chief information officer and managing director of Pacom Systems Inc., Sydney, access control is especially favorable for contractors who can provide system scalability.


“The typical four-door system user’s specification will grow 100 percent in the first year,” Barton said. “After the initial sale, you will see the amount of doors that require access control double, whether you start out at four or 32 doors. So if you really want to get more business and be a success with access control, make sure the system is flexible [cloud or web-based remote access], scales up easily, and can be integrated with other technologies.”


No user wants to immediately replace the system they just installed.


“Consider the entry costs for the software and ease of adding doors and users,” Barton said. “Adopt a system that has a hybrid controller, for example, and can do access control, intrusion detection and integrate with CCTV. Finally, don’t be averse to larger jobs—after all, it’s the same wiring, just on a bigger scale.”


Offering an electronic access-control solution may extend beyond physical security. Now, contractors must consider potential threats to the access-control device, including malicious takeover and skimming to gain access to data and even the network, according to Scott Lindley, president of Farpointe Data Inc., Sunnyvale, Calif. A number of safeguards should be in place, and it’s the contractor’s job to recognize potential threats and to know how to mitigate them.


“Companies want multifactor verification with what they have—a card—plus what they know—a personal identification number,” he said. “With a combination reader/keypad, access control manufacturers and their integrators can provide companies with a simple, reliable solution for shoring up their system, the combination card reader/keypad.”


Another way to protect card-based systems is to provide a code between the card, tag and reader to help prevent credential duplication. This ensures readers only collect data from these specially coded credentials.


“In a sense, it is the electronic security equivalent of a mechanical-key management system, where the company is the only one with the key,” Lindley said. “Such keys are only available through the contractor chosen for the job. The contractor never provides another organization with the same key.”


Do you really want to do your customers a favor? Ensure you supercharge their access-control specifications with the ability to scale up and address current and future challenges.

About The Author

O’MARA writes about security, life safety and systems integration and is managing director of DLO Communications. She can be reached at [email protected] or 773.414.3573.

Advertisement

Advertisement

Advertisement

Advertisement

featured Video

;

Advantages of Advertising with ELECTRICAL CONTRACTOR in 2025

Learn about the benefits of advertising with Electrical Contractor Media Group in 2025. 

Advertisement

Related Articles

Advertisement